d2429db2648ae793898f695cec21291d91c77474ddbbf88c1dfe8598aa67159ed60f02bf3a04f55ceec5279f4c57abe7785173832c19c3accd7a3e0ab5e346aa077702608afa5769aa1a06c01e32c6bb84a7f87c05", 0xdf}, {&(0x7f00000031c0)="edd6d3f90735d75fc5f8bca878b98398ec25a91c4a83d5ea982371ac6fcbd68237c1e051a8adae9b2b3f379393791521a8", 0x31}, {&(0x7f0000003200)="520d8adcffb0deace4e65d1c52abb85f09c3f87cb6290aea639e1e13c5a559b69fe87ca571fbdc3ff74e8282b4a34181ecc620ab5d2cf8c11b61520f4d5f9b334c9e3059c0eb8c7719950cf5a684361914203a8585e2106f506ad2667e1c6299461e8c03fa918dcb5b1379fdead5cf44eebd8d1e5c8cc0e06118e14e", 0x7c}], 0x8, &(0x7f0000003440)=[@dstopts_2292={{0x40, 0x29, 0x4, {0x33, 0x4, [], [@generic={0x1, 0x25, "8c893fe1d5acb36d3c8e84ee003d5ffa7586da202ae4c9a96b9a55abe3f5bbc7fa8a1a30bc"}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x40, 0x6, 0x1, 0x7, 0x0, [@ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xc}]}}}, @rthdrdstopts={{0x68, 0x29, 0x37, {0x33, 0x9, [], [@enc_lim={0x4, 0x1, 0xff}, @calipso={0x7, 0x10, {0x10001, 0x2, 0x4, 0x0, [0x8000]}}, @generic={0x1c, 0x27, "73ebb8988b0e146a377406368e468247e1334b1cd41f95540bbcf7e57933134861cd5ce780da7b"}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x3}, @enc_lim={0x4, 0x1, 0x3}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xa7}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r10}}}, @rthdr={{0x68, 0x29, 0x39, {0x10, 0xa, 0x0, 0x4, 0x0, [@mcast2, @remote, @ipv4={[], [], @empty}, @rand_addr="fc76dbdabb629227b0cd2eff3c5ba06a", @local]}}}], 0x198}}, {{&(0x7f0000003600)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0x1c, &(0x7f0000004ac0)=[{&(0x7f0000003640)="dce630c1cf9ebd4ac844935a249793587fa9ed7bbc52e11f286e1f7d8bed97c595bb85430a93f537941a8cd92570405f1a3def92bf6ae9d69b308aa4e9df785bf8130b93ab38da83c5c7910c4035238f8da3da0ddfeaa5a61b9c", 0x5a}, {&(0x7f00000036c0)="ee5b500a68f01d3415a0a20fd1a8d07ce5cfc049dbd23d587224aa366a7bc1bf6416f7a48eb6ea96d898d1a7819efdecb0888071cbc382ccafdca28143b6c4e595d9205bd3d4a2e646526649996725340c2368d10e8484efe5133f60f3e0167f3af9172897b977e124d380d350fc457ef52ef77219dd3b163c5f1bbe2011b1352c1d2839947840fdf92279098e952d934fe45f497b9974be656f7d5a9e2b81213ed3e96789e3d3da9f61afad1fb8dc7d552cc249c7203455021a32718b500acd70e9fbab655eed042aff6f1452381e667d69ad673011cd253a8a9dec886fa5362a871e89cd6906e59eb3da144b48950783f7f4781d7fde0122bbab6c479f4b650463877e1e922c2412edbc44bf081868e4abde6f9dc9f0a3fff5d488c7dae340c318651a75d0874e57fc52ca97d708d5422febc283185349e62de1c0123afa017b38170b4e0872cc82e0e23e97b2d749713d0047e416740c2406a34d467fba16bc7f3ad0cde0b5e10ffbc85a560733d605c55b4daf4df5feedbd889e3f72f6841dcaf1e7b5a2519c08828e1aedf08f16d3d7c934d6ea40a15bfdea71b3d32ff2107dcc1fd914eaa2bce1f00932f4f7890ffcec993fe99fb22ea0e12ff55e4826fb7f4772dd4b536d1d9efed709f8838a245c0c32257945a700a0da4ad0b4cb45174b98ada48bb138713db6177f5acf62dd12762a3a991beda7e07b42ef7a9e0ea0ded3dba8de4f7cbe6d83f000a1c3e2f85ce3316c9a4e7f0532152a633d9406ffa94199f5e0d48398368aee14a00053812232a30a088ff1382d9882543cc0e84d9e28ffce16c38c2369f3a8521e7a2f240ac6bae65be75d7128fc7f1dfb45c5a4c1486938024b8aadc71574f516fb9fe57dc916a30b382806b93132d618c798ecfc6ae90499e3cd96bf650a3c3c5ea70d9d3cbcab386f0078ab03d1d1b2d524f0f3329d0879d087f4c14683d8d9083c16784fdba45e04cfb6fb42e4ea4874318326248353b6cac486af73322c3bdc3e54f3f2614f19618fcd395d1ee9ba2eb0a74d96a0aa65763fca7aa969dffd481b2976951346194a17a7ef975443017c0e36c67a000e0d73bb4e568e9bfbcbf7f43a62279bfbdd345197f1df0e400a6f33cbf3084890599e797e7547676382a3126fad1171aac3060e0e3623125dbad72adaa0ac000c11ed2ea41342e3cbea4344df4116457eac17e647cfd63a489d837f93ac89e44d1380f94a2d6cbb87366329718331e53228a54a808150dc4ed957bfb74b983ee72b5a8f245884c909dfed0ac7d7bfed0257e3c9fb78807744373ed9e024a98ac41d04f1e15be99b83a8fb4762f03a17b47d85f58d970f8c0392efc5bc51491cbb593f14cb7e5698eb1d1e79f7de74d3d148b4b8810e4db3a423bffa0846dba704a1b56a125b544a0f78d1018871816c8beb07d23cb5eb5d3d0ff05898f6966e2830bc07f898f9ca483a8b8b0a2260b9e9adc0a25b308683f944f1f37482d405e64e4a51f095c8e806c4959490d7252dc1d5019f1958bf171c2ec7ba5d075bb6fd5cfb784bc44ea26d2c1db43d51cae69928fe940e2055315d6af8e323b31cbf24cd29d654cabfd6dc0b7f7cdc76ddf57f9b92862c5f58d0f81c3d63d3b21c27c606ac3e810a6f657d4f2cd8e2e9efa347761c92bcbddbd905cac73aa8f0d68d03c6e30733ee20d296bf6662e4a6df8fe5ab7a751addda0796c96ea009aa59731aff0732bda30c05a2ff31d5428568ec28f38146cefdb12cb0b3b50b7561c8786db4164b77e71889f003cacc97440287df73a12d16162d25fde49dc1f5bb0f8ae55c72fc948239c336454b07d0e8d13acc2d0072023a7ce313bc6c0eb12ea6b370b4724651cf62b3bed68246e766e3241e48de188b4db3b1a234753de12677d0933814cc1ac3c19f156449f131f31ba1d04773a367e31991a4e93a537bb752d8f40de34deb9cbb51fc555e33454a4e189c581fc0c733d900e14b3f4a70e4bf6d4e1d1510fb73c7bc539c2eac10e424c7eacc15ba74a41ccc20557907788eeafbb434a4c1a5fea0a6c4490fa77cbf3554391aac2bd60a2968701a3ffa0f6d8b2ca266a5c5a38798613dfaf2e0243b8f8c9bbf4a87b40e805bdef9bfe821dbc44f178282a69f53c6ba0c9ebd7de2344ecbd0507e11c3f75f5dc12edcabf141cec7a4e4658288ffb1b1cef92cffb22fd3c4076b510094a30f3c56260a085919048c930c41cbf159d36801313663ed260277fc246cf3549e8207d67ed08a8cc20ee7c5d3b3f173df98c3297436fdaf639302bb9b0a50810520ffae05bce2e7c76144d28c4e6c3b60ae61cb2f744575db713b86b4af3f7d721fb595ee49d3b51a503567e7aa0f56901be0c477e0cf229512814350bd2e69bb8be4ea1a578cb46b9b2124e544617fc24789f93d09b75943758424b3c9b3e2fb2ffd10bd2c325b997e592262f101f596e10674f0961b71ec620ac835ecd225fc58917e7a5dc5934062569247fecc922373feaa0bd2a1d2107e0bc634143f637a2dcc85d3d8666eb9c25191b358b200e4caf51d2790c151d0d0b4731f5980606307487a3d9a35aa0ca3edc30f9e0fa3a0a8b23c87fb4d8dc1062d80155310c8a286841bb73cacc5b69e6f2b1270e3db6d28720aa14b67cf8f49ee5b6701c907a10495a7c7352bb9beee785e2e989ed3bac95744fa0d8dcab9012e71d2fe51a6b844c11e373e26731b8fe1f0f8fa000edf25de8b1834303a983e6e7e46ff355c0941be1439b4c1f69966a6ba571cd7f22b5aa048340b887fd00d6b699888ac459853eb733490856eab1c6a910700b44f9e4c2c536ff0727daab21bb14123b834cf97c252b43b0600305ab127dd45e745ecb8ab2eac276eaab7084c22a8027270aff0935323134b30bd0c33406bf6ba3e0321f115947b5525a30efb6c3ede2fbc2a4d3a105c229f2fdcfc731a19e5fd07f8c445426c1dbe703a983eac0e97521d23fb86acfb701c2851111daf03bbf2638f5d9222d9351fe113816ec0aa2434da3acbe9a0e74c3da99e56eed2c0ea8ac9b952d38ed4c7e85b8c82f5e3b02e2c42e2f61f7d4f0266a7cf45953bb29defab7a2046f3549b2b4c75928b065cec4f9f91e6fb5d5ba3c0f24880044231377314f5cd6b324b376325899c2241c4a79ddd122a09a60516f350e114dff7b804c40cf3fa1f1be7790660e0e7a21e41477d266f53e21a9c43a58ccddf19025c5179484faf5b3932845d9c12b29d02e40bafa3d0d0a3c68539dcda45d82c3267098135b839ead15dda6c8fa54130e6091ed8b56e0132ae42c6d6efa3fd305e5d3fd4c59d31c22aa678938c92e6c5a806eb0afa608a43c09f32b0ffd2902a85aada29759121a6927e9c432da75dd752c4421f6d915be266fb3fa3d8a3651222185d2518a530e81031a89e0d7952c90e2c404aedd001cc10280a71f4fe79460482c0d1cdea9533a7799d9028adfcc6aa8fc3659231fe3cfd300160e1ebe4be9e763fc8bdc703f09ca9c372503c36db6c43fb3f14198b74326876f1211302fa50da637b58a66a6f03b392e1ac521085b2f60aab7c51b41957590eed21f0c1d79b1942565c4b4ddefa4ecc7d3dcb3b5e5f0291ae838a0ec395eef47af603b86cf41ebcfedafd7119d8d20eb8ace7b142c5bb134e1a88a4ac1f61e24918ab0fd338e6bd6d76029a54a29eb44380a1beaf72821673a35d60837666ad78c4e7430ea2eeee31f7b20bb8efe70ddc68071fb3d2881d4bd8662475caa5cacd0039da9d42487f80238f827176e1516447e69fd2500147194f66df404533d1d77a0aed6de3f3294843b21544392ee77aac8c3c26549bd4ddf5c971412e1896c6e239cbacc9668127f5efc32115334fe274635aa569c2aa1a0388b0a4d7e9e66c10a62b089b56cec4f867ec1a49fa50d17da409e5ab7e07a55e4fc6e7be061939b0f2e74c384fe6b5259d97a76df2855b62b47bc7338869e1e74347ab399e0fbfc5bdd07d909776a6a350f5400ecd511a049325fa319cbc99110506171eefc55e9ac0c7a8fac97f1f4114a8c09399674329ff4e2e147f63e4dccae5b4f0e544411160bac10bc3fb5fc352b89ab6fac34a8a768446f3ae9d9202c856d23e29c4e7224134511adc0952031150f5d2a41259734269c0a6602135ef24c131b43db840084417fd308fd50db780280ae7bdc75e6a61cf9574cefd23a8cdf5d6e36bdee64d3cb6c2d12ec54a6e176f03c0ca5bc36d3f101d710b85efb851d2291c55d62885d9757dbdc6e7c3bf3371c1d68087f4e663703934dca1bb95fa34fd43536b44cff6ea0d686b50d490f3826e615b9642e7adb892dbfbb578e624da95d76f5367464773193e735026a8ea34e454fd105ffbfc983cc18bd78bbf2fc528a985be732e068e75d4941814407b740acab0d072b1ab45799f0474fc71f52d0019a1868933ebd7e94857d5c0302aa8e003bd63820c4cbe1ac49c717fe9d1164e88aa75ba4d43e37965afac788f73e12ea44ce170cfd383f90d2d2a24dba8bd6f57b4ee2a058215a1a764ce9838897963d0698138e1c6f489804603796a18049f7095358b45ad70728463fff4d6b486e5bef14846ed6def894aee799db0938c39a98a975cfc47dd5366f08ca87e3bc2480a6db91d0e24acc67e04e0372a9f74b7f4a75802fed3d0532c5e24e46dab3f6d2b2ace17d00c1d3fa93c49469e0134b086f721787bb25981f95d22aa67aa45efc82651c7caa1ecdcdce88e53af588f0ccd3b692106260434938f50d0f2ac490e22f9563b1737ec39f3db3a766307633310e4ea816499f77dc985ba9a9a089c9bf29ffde93eaeb20b71b138bc0477d6e27e137c283fddca4fb23a4215cfdf12251cdac4794d723e14162149bd7e968a001d6aab7c30967c7dc38c4d6b3984685108bff8182a53b12a210b49ab621d3e6a4914aa92999c88ff4d7ba6c6cc23b3ba9a33dfc002caf4642021f501bd2c86c50e82d96a8722bf096554417daf01895fdebbe40b9e650883b488257bcd406d7786c3adc1622622dc56541298b752a95b74bb06c264ce6944222a82cdb2638122d90a101c5487cfef6d6f87b85d0d05f47be2ba8fb78cd0cb8c7f4cdafc39d362459e4fd6a1401eaaa3c4ac4e862119658c552f508476603910344be6ca27a98c628e3d2632024554a544b0ca69e575c48fa626d12e1c2bd2797ffda1be749e730a46064431b1c8f07ec1d8e0a7385c2ae08e727825d8198bdb89c602449508bbaada4df27fdbe813a92e368938f3a155b0eedc5d2776101b823789be61668482f38f492b03013cfa81f6cc7ad50bfd4127ac96b7df58b64c9cbffb9098e2713b640fee2d04e5435914cc9a85749e5b2b12f0f2a83d0b1bcc3790781c256c70e114cde5e98db407afe882205d0546a33de007fc8e8856b0a22359cd7cb0bcf21af0aa464b70d540eda8211f598138483f142250fe8944111adde70c374cea47ae7f133fb7d694df37bb1927cb16be82decffebc5efa4d069cae83fbd6edfad80d0de5582e2355ca8c973518b9910994d5b630a60e335041ef91ee8a4ecc9d96fcbbb01ea284889d252f9b2a654b0464669a5c0dd1e51e8ea4d90c15883937452a654ab0799f290dac1b2b59b9af8da42bb50116642a6b15dcefe4a49a919c26b13a9b6f40f61ef4d9a03cd223c7fd027721f07887dab60caeacb9b3d0f1acee7b55a4d5d694a9a76987dfd4cb70aa088e1529883b9f42fa5a7a5d89181bff9f7995bd6c233fba88de5984fbb2a08dbd79a10ce6103c3fde28ba322d827b43b0ec528b9a95", 0x1000}, {&(0x7f00000046c0)="fd1dc91f9a9f63768c4ed06a49156439600f9d23dc8508fe56c1ed8cd820494e766f1f65bb38d5492669641edd1cdf1893bfe195f50b833609a17dc01f841c295cf1c11bb32997564dc913a8bcfc8d9aecb61a02cb1c", 0x56}, {&(0x7f0000004740)="dfc64dfb96033fae5e18a6e85cd19211de763fd62e55532aa47c76269f1e66a905e932af1103c83168865b9baa529dd27f959a35efff631ee1661124e0581906baf328496670bfba209faf0e800660b557606d9e5d22f16d599ede919865710dbd2834a939a2a78b6f849a5b094e", 0x6e}, {&(0x7f00000047c0)="c71cfaafae3582f24de1", 0xa}, {&(0x7f0000004800)="66b268631c08178755a389b1e7c20cbd545067721a949950d50b16e2425c18240fb108ea37e91179395f1f87ac038e7885d899e94279ede15df2bd195ab77c119fda9b3cfd6f2f59be4d2daa22977be1331046b496cae33c158506e73c8a28a9b75df34f4eac92248e0116df3f9a3bafc117119d0c497634be", 0x79}, {&(0x7f0000004880)="3dcc6f1cb246f7105f18913d7b420dd67384046552419030c4d73fa71d1d966b4ff2d2a48012241d2d166b0e8c0f43cc478de522fd35a8c1472dfc18a077b4645d48968260aab7d7c3bd8aba8cfa54f91fa32e752ed03760015c9aa75f50a9aaee7bac16021c667603f127fa47200983032995fccb0c69cbf91ac7c7478098850dd3934e783c18bb41bc23bd5b50ae4b0690a605a41bb47fc746732d6444882e4b785e326e8febd7b211b38d297548e9060a5a1b9c31a1817212a01e27e519", 0xbf}, {&(0x7f0000004940)="af7cf4da7c6ec0d723954ae4d192e4ca62849fb50424789cb129b438abb7c33e971a5ac9ceb3d7d5846c1b6e09029adc18e623586ad95f8beb704c49344462badeec9c13a2ab333759cc32dc16d559dd2fe5a800166259757dcb9e8bdf31b2f98d02bb142f1d08e5208d1e8c3cfb2688c81ccaea7743fb4af584a24bf1d9c153101b2b9fb369e1cc4a26759138d01787e0edd029be5f94bf4b24a6431557", 0x9e}, {&(0x7f0000004a00)="5be30d97845b975fd956bd6950924b4d3f28e192a64c31467b25eb9d80a9a248fba5d1f69c7a0a1d90f8b007f320b7263020f8d2b2f030bc86db3cb7c070e6e9c00b5e0edcc92eb733e784e4373ccb7fbfe8c6f058750f33a4fb8313267a9e70cc295959d62babb547a9976ab32f61ec864bfea299686f8658173d31b3ab4543c8370818202c8f2407cd3dea937acffbec6ac23be8477126597832514c5fb30128972b43a1c3710425d06cd0e048f13363c435fde525", 0xb6}], 0x9, &(0x7f0000004b80)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x7fffffff}}, @rthdr_2292={{0x48, 0x29, 0x39, {0xc, 0x6, 0x1, 0x0, 0x0, [@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="318079be39c5ef8d6e8485b82b3173fd"]}}}], 0x60}}, {{&(0x7f0000004c00)={0xa, 0x4e23, 0x37, @local, 0x2}, 0x1c, &(0x7f0000006180)=[{&(0x7f0000004c40)="88dbc8a1099c743d5c5c9b3f7cf7ed28b84265efcd514cfebf", 0x19}, {&(0x7f0000004c80)="d38b69b8e40d8ec445314d923ec97722be07ad15643cb73a86dad8d095707aeb48812f35d7639e5b179143bf103863d61684912fd2b2e8e282db4f3cf34a9c0a", 0x40}, {&(0x7f0000004cc0)="06174f0f", 0x4}, {&(0x7f0000004d00)="922452f0f273fdc7411c7886c2af65c363b9e3558c2de1a9c5893744524ae8e3eb88e0679fbc894b556b360cd902697b5599eef9fbff4fcfc01b5757bace9d5939acb5b4638f2b0be93f287ef76d273e40a3bdbd48b6639b9181da3bef5a8f84c468b4b183b18374c483f9406048358ae0b6a19b6c583ca41c270e559e3654d8e3989950dbfebbceb9fd8eec51e99ee5d4e870f70c2433e58a00aa53cc6c4c934a2b9392f6f19b5246e5cc8169cb5d1ecb9146417c295d0933e84f410b81bab7c890f90ab33ce21f7c4279371da9f0e4e4b6740a139e98503f", 0xd9}, {&(0x7f0000004e00)="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", 0x1000}, {&(0x7f0000005e00)="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", 0xfb}, {&(0x7f0000005f00)="2fe3e5f62c6b0f43387df55ab16058d9066efb2b5c3ebbbf0addc3844572d558c3c049d947addf7152cff1d5ae6aca0a603b2980404777b9d80c8cdee292eb1defcd10339ba1102771789754cf9493cb351b4d4eeed5ce4b22e6d762a03c17e452082636d9e6516fa873394cc9ab43aa9e455e6c7999b449fca4f2baf61659cc7278277ae70df2fd5c562c5170cbeee45d3a91997c1e4a27c7760cd443e8db4580dca116d63c16c9acbdc710a86693bd59eaf7d33dc85c4eb7c4cd35d18e56b101d22491816c07728e89cfc3c38e39aa96ae7ac4f328d9e7f86bdbe24e90a72f684b6ca2a0807842706ca7ee47d2233aefb39e23ba54", 0xf6}, {&(0x7f0000006000)="418eca6864c75e83325b2c8e55e4c04edb6642b0eb8542d8cb66f05b81993fcfdd75f56476c372509fff1abc5ca61291c5f4a9ef43dfa0878b87dd21aec3610d820a5e84bf45dee2b7ff3dce44cc7d135bac709514ffa0dcef045cc26efb77261c63d96bc2", 0x65}, {&(0x7f0000006080)="c05cbbc1b13a5796871eb94e1b5f176f93ac5e28e3c698b5a2465bc965f9370fab5bd0a6c57ada77be251f7e72cc3b1114d2f53c4757bc16a9e9582778d23a3477438d4bcb8d776497396de40e86484e1c52139b0b6e5820605c79a06ad348e456fca9ffe0f9b5152e7821b0fff4eea5cc94cff032af2c7d2515ac0317089570635411f3f363ec96c8f98202ec24cdad5925d200d13298199acd2a7c4e4ad7dfd7f183d40b7037f272d3869aed6d023e7c90a5c18d3c18c9d42a09f18001ceac75dd5997e9b1", 0xc6}], 0x9}}, {{&(0x7f0000006240)={0xa, 0x4e24, 0x2, @mcast2, 0xa7ee}, 0x1c, &(0x7f0000006740)=[{&(0x7f0000006280)="3466a99086621b21a494e42db5d1c9d4860c068caa3d1d0b2f83c2e531c7d1b133f51c771439c39ca1efc2ebb8fa7d704435590b632b237422d7b96cf30c08541868a777f4c593705a72382b9b171e7f53e6039d07b26a8fbb0821476e974c6ec934aefeb8ecba43085681c532631a16b05e3bf9d9aafcf3d85175522cf9ec7a17cb5aac2524e314718d42c27542b42af65907e96e370acc6766cc477cdde22f0b83a9778678f2fc65d002fdd0303d1a2b63a39c3d6ade32a4a94f6ffb0f169ade56e1aa76900f0ba3c1d6aa2f4b305927fbbfa8a414f09e6ed4630e1111c8ffcba29898ed982a2a977c2739d08270d1a976c316", 0xf4}, {&(0x7f0000006380)="76a74a8a361c7c9235a87734691740f49bc56fa1047bfa2f995975f473f9eb2a79a5d7f010bb0ab68a226173483d95c25fe3fae9b340b2611080106a11db8afc36ed40efdda815a08f01092903faa70bc4fbad5f978ea2cf69629b7205fbb30b7152127276fadfe49b92ae", 0x6b}, {&(0x7f0000006400)="1cb20a6caa0d7e09dc92c395e59787697b873b0ac8b23d87e39d71ad377df448f50913626bfdd37b0fc08530ba11b6768a1e", 0x32}, {&(0x7f0000006440)="e912693bbc8ea2b47e2768e00445dd7b39c283c3359f46b56c029efe4b", 0x1d}, {&(0x7f0000006480)="138f499cbeb57ec39c10814bf12680c0fc620b067e6fbb3eb25a4ae06457effabd7fa90f45e66f5573e159a409de433a6833ff44c0f57cf0b7459b05a0c09bfbd0392dc3e65d6871704618865b3823016f5d36edae2a4e42455fe5658bcb7a9c6124d8876a668bcb487b0ee6582cb8226795d14947cf53f68b7d39be97910c58d8434a2a636cf9b45c10d522c9fc5481bcebf69a4dab1c7cda97d45c7ec7c7dc6f05f8f89703d00c2cf96817d5b005373f2747c4b36ba8983a3db14f27e18e2f903f46da8dc5b8b15dacc12d18282bcdb36b370454e2a70643e1206b", 0xdc}, {&(0x7f0000006580)="1cd8f1df8364d9edd731067b09fa788d5d48842a87ba0f75a65286dad270bf4effc2a859cf32fed3f4b425ee58425383b1a245f363b26e13babc75ba7e3ec977f512285cf781963a16ebd87f2ef5d6e532bc33c15e3a3b3f773ee119637070451081e410e173cc7826683ebe8e0106909df9a1696ade12c00b0dadb1f7b8ffe272716b6c4c888c8130edbbeff4712f8d5147907009e191624b74ed8ffe85c6001c3079a79a491271ec8f791564e92f0d3392a8c5bafc0de3bdcaf64840987146deb7d96788d0f52351e5f2d8c8f8443668e0ea002892f079c58025e492907a87f648fb32fe4ed6cc1ce178", 0xeb}, {&(0x7f0000006680)="0bdc78e2d1f1a7eb0ed622c23836be6406691baa5c80d89456ecd0093e892c3066d94bb36794aeedc77560dd2dba877b4d8a00d342640f234dbe081a84a28cdcdc6a5c7ecc84ec92c8e46b7c1ea176944d1c36ef292890d55fa690af046bc391a13575c98e381c7cb2504ccc61629d4919f3ce44256e7eecdcf0be9fa7c21da94eeb7fd304a84581b982e428063c09bb31e3a32d423d271f5dd55c1c8ff9a21d39c0ded47c71ebbc44ca348a379c53", 0xaf}], 0x7, &(0x7f00000067c0)=[@dstopts={{0xb8, 0x29, 0x37, {0x9eb4b1ef857f23a2, 0x13, [], [@jumbo={0xc2, 0x4, 0x3}, @pad1, @generic={0x4, 0x8f, "c60329322b7eb624842bde6cbf6cac18647e5303e37da379bb73b63bedc615b31f3869b0cb58639473e1978db9726a8f1dbcc1408e0c3cbe499def8b1a4579cda2cd58991b366a05bb64b4bb2cfb5514e5c23233985a00bab8882606a1f6ce84b0d2c668dd9b07f3f7424850ac602bb2bdd3a15a45448f378084ca271a07187acbe6f946cbd4ca6d6a0cfb9bc4a612"}, @pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fff}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}], 0xe8}}, {{&(0x7f00000068c0)={0xa, 0x4e23, 0x4ed7, @remote, 0x2}, 0x1c, &(0x7f0000006c00)=[{&(0x7f0000006900)="763b536fad298e61824245797932ddf74dae272dd3db4455ae370a175f7f5c3ee385e920a5f096331791d2d60d386b952fd3073074f381f75ab50c0a6692293193e67e924fdaf02fc826b74530020923da824e6011313507ec6b67f0b980bcb521247fd62a4abed8708c01b5da36a35b2ee521a83a4fa1354f2525a0c0c99321c42927fec253fcf16830afd08d9203bf65cd6833b48e8c3e8f5cd1af7f1f9a12eef65d81e7f763f7a28d297cd8f37201963fff6d2ac7c4a702b8b840a6934c2a60233350d5f21c2b8353c63ed8d50abf77cdc65a1855ef", 0xd7}, {&(0x7f0000006a00)="711a4084d54ae3eecc8d6c9220876e3c7a4efcb0c008dbc52b22ffc2d35f4c7028fafca03bc8c87275fc57fe646bca67b00dcfe6aba1d7497eb77ed0764c699cc7e705550f4854cb7aab1966a328c02a55ab8df4cc7874d3af12b17b503dc4c7963d9a9fd9a00bf8613f4df1a5d14326176fa8afab1d00d80ced103cb6e0ee67cd7963d950f4a2ad86f6a693ebb8ec1571a4f974b29f594e66bdfd4aa793358c1bfa57f86f633903629293f6936b69da5dc1f40c2abc6c941ac7b3b1a4e4c795fe41696a5b0428", 0xc7}, {&(0x7f0000006b00)="9c43548f68c1875065a3a3c5f15bb6c92eff5ce14ba671a61f51aee6b7d22dc683dde6fc11b3", 0x26}, {&(0x7f0000006b40)="3a062dc2eedca5bb6410d8edc3e1d37b961ea7ae02e70bd4e6f7bc9f81e2a885453f39ff9f1bc7e38077e2b9a2d4d44eb768482ee26722f08373a525b54dc302f0987e10191ed5270abc370d24adf59d0667306bff6485d0f89c5d45b0689cb173c01b43ef9021becbb11c6ad868a1652cb4e74815fadd8f24f8b627369707138a1c97ae72a172dc445b2f54976e82cdbf8722585347b9169f9d392333e046ab40d19ea2", 0xa4}], 0x4}}, {{&(0x7f0000006c40)={0xa, 0x4e20, 0x50, @rand_addr="bf2507632932c38e9e364034d68615ee", 0x2}, 0x1c, &(0x7f0000006d40)=[{&(0x7f0000006c80)="a2ea266aa1a4e16c0a7edb2f44728e358677140f57d24b40fbcfb241d02259c5e97131e014ecd8cc6d4c5b4bddc3acddcbd87a681524133522365344da385bca57e9ec9ff8b85678099d936e657f56847517369b9960258718713061c71f582e305c2102bf46781a70e31eadc7c1b8ff882e5091eab42b755edef6f3564f1bf9a14469f4c843353f8ad36385caa7c6defd31597ddabf3f8324b7caa82087bea3090f7cfcb3de522059e4266552253490ac7438f9a0628345264f3194a84e", 0xbe}], 0x1, &(0x7f0000006d80)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hopopts={{0x10c8, 0x29, 0x36, {0x67, 0x215, [], [@generic={0x3e, 0x1000, "07d5ea1ae59cbb88266a1c75f4c07513a9c445a2bbc5f0cf2669d4542088fed14186bc45fec80c639996978082c72be6311439e58d73ff3b3e96aed837a65885cfd4d8f73e09956630e30d6dbaa2438a38566d74acb582c1b214502e2f2abc7f0d598947b3444c26e6e02d6b0e5fa9907c1080f8475104f4c85f71b1a0519d9c1d0e07dffcd9c1837f39733ed3dfedf08d49a0c196056be44989e6264f021c27c3c1e1893efe76a76fd2b5f4d36fd0b13c28e1ef9b2e5d7ddde77ee92558d81c23036ca7df1be94f75e1e43c2e63d27cdf05075f4fee5fc1bd4224d7607d2bc10cc22eb9751dba6e63731497297d1408a9fa7413348440cc63fe28fa96022e78bd4a44f94144cfa8cb5ed15cdbbf26ea31b73e86cc595dd6cb15fb3e33bf72927d812ce608e77ad7183c63b2e34580b5f8781ec35888e5a4120c370a5dc6235b3bc983bbb34cfa229491de68eed64391a802b41ea37eda3409fabe673fa58adc7a2f833e97026818e7f4835cdcc3a87ca514bcb27976d2eb5d261504f1234d97b2f2f5444c668fc397b386dc53443209a79be936236e67f70af64e8296a52a2eeb5cfbe292b85e30cdbabbc63a3bdae994101c2d6601ab5473484c1d0af88206d4737c26c9d38a27d4c6d41de2ddaf5125c097db0d5e726ec58c177fd68e885a95503669276e468df11a632797a6f54531efe0db8137d5baf692c4a581dea8896687f0686983a03a6ea8671cc2da386e0391aec9c4e90bada5fdb84e379bfeaa0fe881e7a6531700e0db92f7f1111292eb62a892382e1c0b848d755c5346c8c5db47a9b26ba7dbcaae377b307b9e7749f23f6dc1232bad598f6b9ca4f27cc24b67921d9abb5e07009e266fb328b4b834a0bfd13f0487d28f81bb49a4e5db94e903615aba7a86d96b81f4a697cc1d0a7facebd883b84ca1ce59468bbd82abc901de7f93273fb8d598da17640924d930628559d1a797147a11451de9eaf1f7bbe7421d57cf71b3289135a1b45b7cb489fe16556bc377cec752864678756e7f7acd5f2d9f93b4cee2f1a738cbeb5fc37e16a33511cc6f92529017d740b329b3cdb90613791edaf8df458cac8797145290e5b248778b96c6007d22ec918d759af65b7170388de5ae39808e8939e6b20a17ddaf1748d0d50614d44305b2f2751dd31e55191b1eaff39c807e98249ed9674e72bf505add37ac743fc8d6311133aa1734943639af06f2d478b760c778631867f302a618e9f41835d2169a64a3739b4736b6cda6d9267e5feacbe46e2de965908d622125b3435f2aec78b9fe035def7845482fa68bcfb36e355f37ae7a94c63d7204929e36a61aeddf92997ea4aeafb6aa91099768aa002c6105c97ac5ad997360fcffd0d145439e85b84aa5a67ec94b3bf10b99b72906915f060d22cbb9a18922694963c3021cc5ece8f5ba619089f26a729e18a384cec3204bd29e7bee039c62ca2340e01f864c528ed9c99190975864592e6e405e20eed444f70a746b25ec1c1c084b46ec571cfe0da6090f743b64ac2ee5816f3f1c9406efa72d4a986b62050e35f59c5685ae9312423ea67c82f1b4f9b0b8c460d7e6e3e72ff3f3ec6b181bc643fffd98119f7a756faeff1462c377dc848dbf3d0b1916aea89156b5852e32985e60df084389e3774041c173b22a6bd50bd4915a1f29d823f3ea7aa2d5396a84b5f1cab77d0dfea0fcdca1f75611a504212d5a95ad1b8c05024da75967e3566963489bf07c8fae1d4e6d5fa0428376c256b94a581faf20795fe171c38849f727ca8e5203cbd4eba591cba47783a367a1fc71a37cd8b4a0034cffdf3ac0ec77c34346afb8ffdf083e34bc8f72a9ebdf8022f3b194481881f34234464519966eb9c4f2e50f2673751abc6c79f4e6f24b49bc9c0014ce49c336d89168d3f35108e240b2f00291acabdd2f5a56fd662569188854cf9535ca3a3f99da52f80d68a3fc703b4f8b605509cf79bd698ee2c78a8bfed0e4abd1922d04af5661092b40738f255562c552e05d1c609b077388a4834cb37d10d3a4c3087c9cdf1b28c124eabc30e90b3dcf5ef1af54041d25b909cea0be65f8bc8bf5c55e687540ba5e4a144b1d0b2172cb8031266aa6c042a09d9924103d6e1a4f675a938b7b57c531d0e597e709fdaa820c27da78633f613bcd9127ce555e0672003422530c5f6ab5f6a7fa403317be69b7473a82f0ad8ff16b7e805bacf0b0e560e5d1b9fa6a28e50ae7de50f439f532cdd0cc99e8b2109155887a537c1ceca08579823c88261a7e085b94ad7f9f1cd9ba31b9f03921f2c55ec4a6fae436bfc5b2f77e7cab495a9ac9ef8d58687455e2885914082b6bea5071c1d26ab19a7079359900daed288e7affe493d645bd3cc7cf9fd40dbfca9c6ed86e581094947e5958cf0449aa3472d68eb3b94150d3958137d64aba425c9e19751e9a74f44ae324b24621a348f0893dd4cf11a0bbfe0a5c056b340d6789a27dd62798d9dd482d8ce12edab8c05b4671d235f885ef45b2a333de9bd44dee0aef9da5f16b78641cd45b301ac4f305149ba6524719980ddb1371a131fff403b67c5afbc9289ac9c5d9f5bd4a872a49157247d5e1c8f79d6c3f937e333f199badab5ccd3e989b4c59a4524730ad0bab3b59887d5209a680e8c08c2a0b4de1ffaabde6aa570651fc78d17abe7db9d074e2de3d2208ecaa9c369ecef02b3b0b1ef2457a4912810afcbc6d647b9b484f718580bf2b86c550c1c1e4ef50566c53e20e80c648a02fd7598b858b0677657693beed76baae0b0096262b0536ff5f9fa89a9740a63b0d10e50960bc7670250d3a6906bd728fd6c480ab392d82bfdf0cd7d351c760cee28566cf9c8a091b8a6e71b5e3f0654cee3ba29b0de9fd8f75bf33e4ebf41ee87695c2ea76acb07a7aef75b02fd959d5da77b6337bc50b851fe218bf1e694610ac115498d1d8cf0aa63fae620190a618d4490d94460b1b27f1486ceab20c6ce51f3711ecd39a2609af97decc7d91f3b4489545cf66cc2cc093ec6de709ebb04ba767acf3e8f5af7e17ad4cb5a065e0ea8b1e0f653018b4416e665f654d5dbd7db4dd5a819683a0a926a53404fd2c589a06bb002f893e301584fb5f02db083a7e03e23c62475d718ddf926d6017dc5bf620cff33346b645f6b18768581cb11db59241bf5cd82283b2aaa8fa436387cdffa48266c791b9d07f9b90f78adac88fdd417134fae0d32e5cad089b51d2355a37139fc12e9f3b5e17da550ae08d524975e182bafbf3dcee473aa93109729ead60394a2a44214cf66abcd68e8f264d74cdca245bdbe6c1e7afce106b5694ee7be7ccaa1bb09e3d0ddd7230e22c3829287ff51d77997675e5d3e74d8eddbce705f2d464e9b520b236fb579ea1cd6922825f2dacb2192b96e6f1b49901088d5c32c9e3b443c0648a26ae731b63c80f9b2e098554e3e85bed633b6bb87cd2ad223f867551499a1515b7dfc2c153df60ca6af1365214a482d16edd203036b98b585a432583cafdee7169bf6edf3c2b46c13461471c48c4ad0434fec7266947963eb9095f2f785e2bc94ebebdc99b3fbead994f0aa03ed42c0d5419ce0d15784a064f552d023218e930299ab08f171c171bd58a0e6d2b47baa6b2c38e6d13f8564800547678a9e5002adc4ee6e344c94919d9bb701f538a0098bc1c78f740944d98dc4a924bcf94096880c6bba5e4bc1ef4bc5d6c337ab83ba858984be3e6c61c9d7517bb98b8848274045b931a3179d2dbd07b87974f5f62d02db1eacd4ed0a7c2f85cd7e4e02ddf361c06d3cc591f72d46ddeda384d15983494cdee227d6558b6b4035392e92af376155483d7a22edf1a075ebe873e1d353c1e6677a08dd071547fb3877b227a70af9102ca8d173fa43ca402abd177b3f29df0816cba94dc9027abbf7f568278dd6145a365268cb7a554bc6ee7bab10fe2cb727464f1cd996c17489f0a0ad0c8125c22d9142e0ff08084855237696479765bbd092d1eef2ef87212f55a01a071fd009d644af6c630a974fd939636d4820784dc87f6e127a85017197d3dd7e7e543d11758ac6f821a5ddd751ebcc645b06737c42dcf57f6b7f2782bd0fc2e611af399bf33ee56c47318661257997594ac6171bb3f05c524a418803b09c6b2db71ac583be987795c751e1c90c28132bfc6eec7e5ea163f23ed0dedbb3989f6e9eb52a61106fed14eb58e8135aa20ca2b5f9fd94afca112b55f15e40ddcc3a73d5fd06b377605186ef7f3f3b4ad5f39954d1157a0459ccc96a59bd60588b7ee91db3d194c639cd083a478bf303013633fdd66409db15ce1f93ad9e4da31bf3055c62499ab3536b7d12e64d7087ef21faf5299813a43094be79b49dbc7aad6016652ebdf1a2ce86a4936ef2dd45912a2c54e7632fe648ab43e5d6e627e5dc30e94ff4b56429a509220e556e966231e7cac13f298eae665c2e8cc21ad32a320eedf2fe091d175bde6730ed3c703393e27751cc0a65d4da0024f1bbc19ba89cf435a95d63dbfa222498e6ebef13cac28193cdc096875b3e1c70ea90dfb67220d50c7c82e6f8ea18ffbfc41e1ca4a286c03af2494aa3e5deae4976b530498f142d94eaed4a334de17d38c883be660947412079f2ffd1c224354e916b9eb508b92406775842e5e7412f5eb087908b5e0c005032a0fd2e73a861935dc5a2cc283c3fc8d32547b952188ff0fd854e14398b8fe4e8a03430022d6c4874282e48a8ffa159a20012a8404d1208b8bd7edde727c4db459efdc6087e77c46d95d9bec53b0941ba3b0bcd5648b166be4b12bd06517741d76cbbecba68c1e2c8cfc9e89712dee45be6f1571ff1475b36951a6ff690c8468558a9e9aff93ac146c81e5bd5d3adf99731c5d0aa7446732f88fbaad51bfa3c56219b3c4b6834af1de85d76f7a840ffe80ad21c0212363e26b86831923e953012efff39d5df986b2eeba0c9b4757ce1da3be53dd2db4af58afd1655b3266d685af1f8fe339a33c78a40877ef26464f83b3f86be7a49b9fc907324aaed1be5107553c691875b435e2f9f535423ed7aaf155d120d9e60bd4cfc35e90d7e34eee5c2c0c9e7836333e5e25bc61be0740f65d1ef53ab9053b44bb7a363691eac99062ab78a17020d067c62762dd7596610e28f2733b40fd576a20bf988ecc00b7ef7181e34d6d3146845045c88c5c90966c3a411076f3015e5e4c9063051d7c90dd41de40a9587b4afc10fc451850d66b73d75435a5ca8369dce30499553fcf00002d0fa51bc1955b83c4a15b0d17705f54a310b95c4d1448a32f47c8ecfa8df63022f118980825e40b2f0319b9263911c882e1c0d1685a436d9485b6bd45d96fcceade491ba17e2f03ca15c98bef2a75c16c5ceddf32058231aa369644241840832c8d1c6d1ec86ca949d702996dbc22851a36c4cb0ba870b077c3c33f5dae4186cf8500107dc4cba33f22c7f68119bc9c9d30d0407c8f0ac0c69a0b1df6321a48958d1c125dfc59255b756686c2232a3005e6d9d6168216bc6f3f3017be369b653838c45b76c6168c477beb5b128ffd4422c5fd786ef631565ca5260b25158fe4f73d841099c9c6e5a1cf74ed9417912afd4209c5ae299cd588e8e9238bcc2320cdc730962cb200b0b6409f86a9ef631ca4ddcc7b7f4cacc76775cc2c722fe47dca6ece8403d93374302ce6515d287c3bef92068a971d9a977480a9182233be7a1e0c805bd0fb0758d9166a731b80b8083f073b54c2e6e661fb59cf76ddaece3a24850fb195b54f740f2f0d05bea8283f03d9afdc8f412b4f15d05a1cbc"}, @hao={0xc9, 0x10, @ipv4={[], [], @local}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0xbe, 0x7d, "5f298dd9de3d3273245310882229e8f0424cbdc0b37a1fcb8265cf11fb433d829dfb8df903b7f89b222c8ec01458807532854250f24bcab8f9b66474725595e08cba0a599e41829ae64fa50bc33e607e59712e6475afa2348f7b1907e513650bed03ed783e16d40e8160d70606d85da7f3d675e47ae67f9062fdeac65f"}, @pad1, @jumbo={0xc2, 0x4, 0x7}, @ra={0x5, 0x2, 0x62}, @enc_lim={0x4, 0x1, 0x6}, @enc_lim={0x4, 0x1, 0x5}, @pad1]}}}], 0x10e0}}, {{&(0x7f0000007e80)={0xa, 0x4e21, 0x100d, @loopback, 0x200}, 0x1c, &(0x7f0000008340)=[{&(0x7f0000007ec0)="1a303b5f05e219ab93ba99faee8ea796ce54b14bde3ad8ea5c736ba9421c81e618e522fdea1e69ab025767e7e63d02724bdee25dc6de597fbcd81b0893b5d84b301c72b702734d5b522e898156ce1f910575eb92bc6c71c3a855ee1639f681683d73a87a5d6c353d391c9c774d9faa5c9f399cf2b9fd5175b8fc14351383c0ae2b18fa17cb23a2e5f92f282dd07a058f684a0d5b9abc7b2fbd7aa4d221971caf12bb1ad7620d25da08179c8ddcfafd1c8a416fe104b963fb2a8737fe17", 0xbd}, {&(0x7f0000007f80)="7b1fffd53a6ff969f7c75dc829028daddab04bfafcfc3b00a12d01849555511384d79c7936aa0f649c5baae1fb83a4029a9a00992fde1b2ea2333c273e4ced935d44eb7e8b4c47d84e7982c61b5e18020023f5e988a1b8a1947ddd24c712ae745dfeeaddfddfea8e2bfcf91599a63825c4e460a24a96e5d021cf83da16cabacde01963e537f9538aaba229793010f0c8dd37a609d49d0ac2dbfc47acb514493e9e", 0xa1}, {&(0x7f0000008040)="8ec3c44bd912c90a97f2fec16f79c86b6043cd3197099279251bd9cee2aeea32a8097161a5c601d2dd3cc3c387daf48a59f772b7b5544ce484e09ebaa992ac3560c8de1a608dd92b879ef7453deb995709d53178ea9039c575cd3d49d94af5e901d03bc8ca3b827a3b99cbaa2e7422b6ced69226f8b7dbb5489f3513ef2aa297c5b5f6f164169f571975e20c1ddd75defbd1905f09a81ee84179dd1631fe10af3b646e9748aa184f8d4a3af180d582015399cea8b0547f5a23c252ee", 0xbc}, {&(0x7f0000008100)="db691903b58c5adc9711a25ec0b5606f7e611a0059ddfa678075797bd5adef1e0e671b93f20123f841e3b2e97aa8c6dbe9476e78581edda6f76736ce0bf81996acecee489e7c75f7363a5caa179350d1aff767ae21be45bc0c2618d817a69276b28acaeed088fef079b7288d24adc40cb11001882e39c1ce9588b687f3e0fa91f7fda752c5e63fd6a2b3a471a32f952569a2d28c87704fa41222090735", 0x9d}, {&(0x7f00000081c0)}, {&(0x7f0000008200)="126b95870887651f2adc83763daee65246f4c4df7196fefb47f6c2298ceeda70bb8c5620e5ac304e2e9d5efc863d5340e5b36b09e8c1ef3625f4c838b4d8", 0x3e}, {&(0x7f0000008240)="9976a635fbe33e966857a0df15699f60981e7fa82f7c3bebb51080abbc714d03c66f0d1da95db1702c9ec3df9ad8a519a4e28edf71ed63b5e39852daa629707f9cb588db63041a7b1570ad884eed834935253d4a378ed14646be944566368e47c7d2a0a3c1567f39ce2eed031f4da48fdc1b5a9abe48e9d108167d2ecf8ee1f5d91db85a56b25e3e9dfb0734c148709b0f9f0cd9064371f56e3e10aa43aa648c34d1633affa5797e642b8703", 0xac}, {&(0x7f0000008300)="692ec22deb8bb6fc", 0x8}], 0x8, &(0x7f00000083c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @dstopts={{0x60, 0x29, 0x37, {0x3b, 0x9, [], [@generic={0xe8, 0x28, "012ea23eee0d8b6ea8e5b758b3ebbac6b14ed2c1bfcfd1b6b3e5e54c2871e1a2056a8cce08d82f0a"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x6c, 0x2, [], [@ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @ipv4={[], [], @local}}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x33, 0x1, [], [@enc_lim={0x4, 0x1, 0xff}, @enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0x2}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x2e, 0x4, 0x3, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xe}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x6, 0x2, [], [@hao={0xc9, 0x10, @rand_addr="f71c52fbc784a86eb1b3ccc96c385159"}]}}}, @dstopts={{0x40, 0x29, 0x37, {0x2f, 0x4, [], [@pad1, @enc_lim={0x4, 0x1, 0x40}, @ra={0x5, 0x2, 0x8}, @generic={0x7, 0x19, "169cdcdb629c32984dbcb92deb9e3419f9f1b223bdaa11775a"}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2e, 0x0, [], [@ra={0x5, 0x2, 0x200}]}}}], 0x1b0}}], 0x9, 0x40000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\t\x00'}) [ 1192.304816][T11262] loop3: p4 size 32768 extends beyond EOD, truncated [ 1192.441761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1192.447618][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1192.503375][T11379] BPF:Section overlap found 01:34:20 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\xff', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf8000000, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00001900"}) 01:34:20 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28726, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1192.763423][T11394] BPF:Total section length too long [ 1192.824687][T11407] BPF:hdr_len not found 01:34:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1192.912888][T11490] loop3: p1 p2 p3 p4 [ 1192.931086][T11490] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1192.964701][T11512] BPF:No type found [ 1193.012749][T11490] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1193.023540][T11490] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:20 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:20 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28727, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00?\x00'}) [ 1193.311833][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.317669][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.340067][T11532] BPF:Unsupported section found [ 1193.353111][T11526] loop3: p1 p2 p3 p4 [ 1193.358006][T11526] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1193.386194][T11526] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1193.397512][T11526] loop3: p4 size 32768 extends beyond EOD, truncated [ 1193.414769][T11535] BPF:No type found 01:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x3, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:21 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28728, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00@\x00'}) [ 1193.654570][T11597] BPF:Invalid section offset [ 1193.780102][T11652] loop3: p1 p2 p3 p4 01:34:21 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)=0x400) socket$key(0xf, 0x3, 0x2) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x6) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000003c0)={0x10002, 0x6, 0x3000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f0000000040)={0x3, 0x2, 0xd9d0}) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r9, 0x0) r10 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r9, r10) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r11, 0x0) write$P9_RWALK(r11, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r11, 0x0) ioctl$EVIOCREVOKE(r11, 0x40044591, &(0x7f0000000300)=0x6) r12 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r13 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r14 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r14, &(0x7f0000000300)=ANY=[], 0x0) r15 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r15, 0x0) write$P9_RWALK(r15, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r15, 0x0) ioctl$EVIOCREVOKE(r15, 0x40044591, &(0x7f0000000300)=0x6) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[r10, r11, r12, r13, 0xffffffffffffffff, r14, r1, r3, r15]}, 0x9) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1193.803985][T11652] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1193.871755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.871761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.871786][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.877711][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.884198][T11652] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1193.890494][T11665] BPF:Invalid section offset [ 1193.942383][T11652] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x5, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00035b00"}) [ 1194.031358][T11674] BPF:hdr_len not found [ 1194.127148][T11680] BPF:Invalid section offset 01:34:22 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:22 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28729, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000ff00"}) [ 1194.422018][T11795] BPF:Invalid section offset [ 1194.575147][T11810] BPF:No type found [ 1194.601771][T11804] loop3: p1 p2 p3 p4 01:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1194.684876][T11804] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1194.706609][T11804] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000200"}) [ 1194.746633][T11804] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:22 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1194.804859][T11919] BPF:Invalid section offset [ 1194.972851][T12019] BPF:No type found 01:34:22 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x8, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:22 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872a, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netfilter\x00') ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000380)=""/235) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:22 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfeffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1195.133652][T12036] BPF:Invalid section offset 01:34:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x48, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1195.208527][T12046] BPF:No type found [ 1195.226192][T12039] loop3: p1 p2 p3 p4 [ 1195.234074][T12039] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000100"}) 01:34:23 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xff600000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1195.298533][T12053] BPF:Invalid section offset [ 1195.333253][T12058] BPF:No type found 01:34:23 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffe, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1195.374649][T12061] BPF:hdr_len not found [ 1195.402232][T12039] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1195.419253][T12039] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1195.490898][T12070] BPF:No type found 01:34:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x24800, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:23 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x60ffffffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1195.761477][T12083] BPF:Invalid section offset [ 1195.865675][T12093] BPF:No type found 01:34:24 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:24 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000200"}) 01:34:24 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:24 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x60, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1196.340227][T12213] BPF:Invalid section offset [ 1196.346305][T12211] BPF:No type found 01:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x68, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:24 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1196.385572][T12208] loop3: p1 p2 p3 p4 [ 1196.418001][T12217] BPF:hdr_len not found [ 1196.452402][T12208] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1196.474198][T12224] BPF:No type found [ 1196.479225][T12229] BPF:Invalid section offset [ 1196.485210][T12208] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:24 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x200000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:24 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000300"}) [ 1196.540209][T12208] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:24 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x1, 0xa, 0x4, 0xf948fd4032b24650, 0x9, {r3, r4/1000+10000}, {0x4, 0x8, 0x8, 0x20, 0x4, 0x7, "8d1d74e1"}, 0xffff, 0x4, @offset=0x10001, 0x9, 0x0, r1}) accept4$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r6, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(r6, 0x2, &(0x7f00000003c0)={{r7, r8+10000000}, {0x0, 0x1c9c380}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$SIOCX25GDTEFACILITIES(r9, 0x89ea, &(0x7f0000000400)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r10, 0x0) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20012}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r12, &(0x7f0000000300)=ANY=[], 0x6) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r13) ioctl$EVIOCREVOKE(r12, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r12, 0x40485404, &(0x7f0000000600)={{0x1, 0x2, 0x5, 0x2, 0x81}, 0x5, 0xee90}) ioctl$EVIOCREVOKE(r10, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$IP_VS_SO_GET_INFO(r10, 0x0, 0x481, &(0x7f0000000440), &(0x7f00000005c0)=0xc) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:24 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\xe0', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1196.786965][T12342] BPF:No type found 01:34:24 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872c, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1196.953365][T12352] BPF:hdr_len not found 01:34:24 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x300000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1196.975302][T12354] BPF:Invalid section offset 01:34:24 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000400"}) 01:34:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x74, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000500"}) [ 1197.155624][T12360] loop3: p1 p2 p3 p4 [ 1197.167362][T12360] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1197.179163][T12366] BPF:No type found [ 1197.227634][T12360] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1197.242266][T12360] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:25 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x400000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000600"}) [ 1197.451952][T12384] BPF:Invalid section offset [ 1197.471767][ C1] net_ratelimit: 18 callbacks suppressed [ 1197.471781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1197.483316][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1197.503218][T12387] BPF:No type found 01:34:25 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872d, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:25 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = openat(r0, &(0x7f0000000540)='./bus\x00', 0x500, 0x1b0) r3 = syz_open_dev$media(&(0x7f0000000580)='/dev/media#\x00', 0x1, 0x4200) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f00000005c0)={0x6}) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x0) sendto$inet(r6, &(0x7f00000003c0)="0f3399a630c725274d7a09965043b84243b0846db9848975a896659aa92037c2bf38877cf31ab8fdb8fa78d3d4056434551628adf16bca8ae3ee566fbe945ff161fe9a1150a3ca1b2238b5495a70943fb7d61bad9290ccb4d518cfed710d37d8af3a5202696cbcca62e312faf92f7b6ad8e0387bfc202a1b9cf5ce16744bc396c44bd1a3f824495bad68715817337f8f16464fa68490233e25132152f1a777bdc1aee87eab6f88bfe54631dec5c27e407b04f24941e89d189224850c673af012cc50097125d18317f9578e383a3dc0a3f75ab0172f589e4d974a2083aac3a89f67505a1f01", 0xe5, 0x4004000, &(0x7f00000004c0)={0x2, 0x4e20, @rand_addr=0x7dfb}, 0x10) write$P9_RWALK(r4, &(0x7f0000000500)={0x3d, 0x6f, 0x2, {0x4, [{0x80, 0x2, 0x3}, {0x20}, {0x1c2}, {0x0, 0x0, 0x7}]}}, 0x3d) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) getsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000140)=0x20) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x80844, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000380)=r10, 0x4) r11 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r11, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x1]}) ioctl$KVM_RUN(r11, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) 01:34:25 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x500000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\a\x00'}) 01:34:25 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:25 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xf8, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1197.883716][T12509] BPF:Invalid section offset [ 1197.923640][T12514] BPF:No type found [ 1197.941144][T12506] loop3: p1 p2 p3 p4 01:34:25 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x600000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1198.031785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.031803][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.037576][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.043308][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.059378][T12524] BPF:hdr_len not found [ 1198.064297][T12506] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\b\x00'}) [ 1198.111780][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.117568][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.142561][T12506] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1198.171567][T12532] BPF:No type found [ 1198.176346][T12530] BPF:Invalid section offset [ 1198.184275][T12506] loop3: p4 size 32768 extends beyond EOD, truncated [ 1198.210559][T12522] QAT: Invalid ioctl [ 1198.229760][T12428] QAT: Invalid ioctl 01:34:26 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x700000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x8c040) write$UHID_INPUT(r3, &(0x7f0000000380)={0x8, {"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", 0x1000}}, 0x1006) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) 01:34:26 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x300, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1198.431783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.451386][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.516751][T12547] BPF:No type found 01:34:26 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872e, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\t\x00'}) [ 1198.593542][T12552] BPF:Invalid section offset 01:34:26 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e00000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:26 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x500, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000001900"}) [ 1198.879564][T12574] BPF:No type found [ 1198.892421][T12566] loop3: p1 p2 p3 p4 [ 1198.906527][T12566] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1198.943202][T12586] BPF:Invalid section offset [ 1199.026780][T12566] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1199.050380][T12566] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:27 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00?\x00'}) 01:34:27 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfeffffff00000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x600, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x2]}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000140)=""/62) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:27 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2872f, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1199.325889][T12694] BPF:Invalid section offset [ 1199.371399][T12698] BPF:No type found [ 1199.502524][T12708] loop3: p1 p2 p3 p4 01:34:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00@\x00'}) [ 1199.526644][T12915] BPF:hdr_len not found [ 1199.529155][T12708] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1199.591909][T12708] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x700, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1199.632248][T12708] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:27 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff00000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1199.812574][T12923] BPF:Invalid section offset 01:34:27 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28730, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1199.956374][T12933] BPF:No type found [ 1199.973958][T12933] BPF:No type found 01:34:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000035b00"}) [ 1200.141365][T13045] BPF:Invalid section offset [ 1200.164187][T13043] loop3: p1 p2 p3 p4 [ 1200.212529][T13043] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1200.268667][T13043] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1200.311112][T13043] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:28 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) rmdir(&(0x7f0000000280)='./bus/file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r2, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000080)) clock_adjtime(0x3, &(0x7f0000000380)={0x2, 0x3, 0x0, 0xb4, 0x1, 0x9, 0x48, 0x5, 0x8, 0x9, 0x2, 0x4, 0xfe, 0x40, 0x5, 0x101, 0xbf, 0x10000, 0x71f, 0x7f, 0x4, 0x6d, 0x2, 0x148d, 0x7fff, 0x2}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000140)=ANY=[@ANYRES16=r0], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000500)={0xa, &(0x7f0000000480)=[{0xffe0, 0x4, 0x2, 0x6}, {0x742, 0xe5, 0x5, 0x30}, {0x3ff, 0x40, 0x80}, {0x101, 0x40, 0x0, 0x4}, {0x8d, 0x81, 0xff, 0x6}, {0x3ff, 0x0, 0xff, 0x718a}, {0xf162, 0x20, 0xd7, 0x9}, {0x6, 0x0, 0x0, 0x7ff}, {0x8001, 0x4, 0x5, 0xb3e3}, {0x8, 0x5, 0xfd, 0x7}]}) 01:34:28 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffff600000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000ff00"}) 01:34:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4800, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1200.554094][T13170] BPF:Invalid section offset [ 1200.560091][T13166] BPF:No type found 01:34:28 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28731, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1200.643859][T13188] BPF:hdr_len not found 01:34:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c00, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000200"}) 01:34:28 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1200.862675][T13289] BPF:Invalid section offset [ 1200.920676][T13285] loop3: p1 p2 p3 p4 [ 1200.952265][T13285] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1200.963073][T13298] BPF:Invalid section offset [ 1201.008745][T13285] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1201.048426][T13285] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6800, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1201.059919][T13304] BPF:No type found 01:34:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000100"}) [ 1201.187652][T13308] BPF:Invalid section offset 01:34:29 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c00, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:29 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28732, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000140)=""/95) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000200"}) [ 1201.651835][T13432] BPF:Invalid section offset 01:34:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7400, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000300"}) [ 1201.755271][T13442] BPF:hdr_len not found [ 1201.766702][T13428] loop3: p1 p2 p3 p4 [ 1201.811987][T13428] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1201.855763][T13450] BPF:Invalid section offset [ 1201.904262][T13428] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a00, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1201.962628][T13428] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:29 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000400"}) [ 1202.123840][T13557] BPF:Invalid section offset 01:34:30 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xf800, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:30 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28733, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1202.429944][T13575] BPF:No type found [ 1202.461559][T13577] BPF:Invalid section offset [ 1202.591790][ C0] net_ratelimit: 21 callbacks suppressed [ 1202.591802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1202.603678][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1202.662896][T13644] loop3: p1 p2 p3 p4 [ 1202.679934][T13644] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1202.691852][T13644] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1202.706319][T13644] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:30 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000500"}) 01:34:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x2, 0x26) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000280)={&(0x7f0000000140)=[0x0, 0x0, 0x0], 0x3, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xfffffffffffffdab) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r8, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) r10 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r10) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x5) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r11, 0x40084504, &(0x7f0000000400)=[0x1000, 0x80000000]) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x54) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:34:30 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1202.791985][T13693] BPF:Invalid section offset 01:34:30 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1202.831777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1202.837723][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:30 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28734, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1202.920834][T13703] BPF:hdr_len not found [ 1203.041661][T13813] BPF:Invalid section offset 01:34:30 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:30 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x3000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1203.212324][T13822] BPF:Invalid section offset [ 1203.229719][T13817] loop3: p1 p2 p3 p4 [ 1203.256730][T13698] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1203.287161][T13817] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1203.305710][T13817] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1203.317020][T13897] BPF:hdr_len not found [ 1203.346384][T13817] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000600"}) 01:34:31 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:31 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:31 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28735, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1203.638326][T13948] BPF:Invalid section offset 01:34:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x20000, 0x0) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1203.711786][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1203.717599][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1203.735917][T13953] BPF:No type found 01:34:31 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x5000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1203.905429][T13959] loop3: p1 p2 p3 p4 [ 1203.910112][T13959] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1203.938501][T13959] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1203.961954][T13959] loop3: p4 size 32768 extends beyond EOD, truncated [ 1203.986579][T13969] BPF:Invalid section offset 01:34:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) sync_file_range(r3, 0x7f, 0x69, 0x2) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000380)="d686d8554849bd529b0c31b612c552b18ad613415a65b2516687c768067f2bd474946c40a93e7b8076983827ab0708d5299441427054753a828e37dfd0453a21cd52fe0450e08adbdd3bc89ccb1a989f4f319c0aad9f3df864feb9ca34a43db08b5fcb7fab3d2322c50ce9bbdd4c2b2a5d503b1f45bd763136d9da45b7135a74cd0dc3bc652f579779560cf7e5cae28413ba4560e12af814bffe8a8db684d7bac1389f784ee9b94b1f9bf33b500302ac3d4de42b5493e1da784959b30c9c58577ac306010e1b2b92fd668fb558", 0xcd, 0x0, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @mcast2, 0x3}}, 0x24) 01:34:32 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1204.271777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.271783][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.283332][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.348104][T14087] BPF:Invalid section offset [ 1204.361798][ C1] protocol 88fb is buggy, dev hsr_slave_0 01:34:32 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:32 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28736, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:32 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1204.593418][T14147] BPF:Invalid section offset [ 1204.662108][T14154] loop3: p1 p2 p3 p4 01:34:32 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1204.705769][T14154] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:32 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x8000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1204.765348][T14154] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1204.773311][T14154] loop3: p4 size 32768 extends beyond EOD, truncated [ 1204.845767][T14253] BPF:No type found [ 1204.977006][T14327] BPF:Invalid section offset 01:34:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000001900"}) 01:34:32 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28737, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:32 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet(0x2, 0x2, 0x1f) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000080)={0x8, 'veth1_to_bond\x00', {'bridge_slave_1\x00'}, 0xcd1}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0xff5, 0x6}, 0x2000, 0x200, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:32 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x20000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1205.249738][T14342] BPF:hdr_len not found [ 1205.366577][T14346] loop3: p1 p2 p3 p4 [ 1205.402002][T14346] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1205.472672][T14346] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1205.481078][T14357] BPF:Invalid section offset [ 1205.502647][T14357] BPF:Invalid section offset 01:34:33 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x48000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1205.532248][T14346] loop3: p4 size 32768 extends beyond EOD, truncated [ 1205.785275][T14469] BPF:Invalid section offset [ 1205.804967][T14346] loop3: p1 p2 p3 p4 01:34:33 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x6, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1205.841927][T14346] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1205.866425][T14346] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:34:33 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1205.924547][T14346] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x2a}, 0x2}}, 0x24) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r3}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x0) r5 = accept$unix(r4, &(0x7f0000000380), &(0x7f0000000140)=0x6e) setsockopt$sock_void(r5, 0x1, 0x3f, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4) setuid(r3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:33 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28738, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1206.134018][T14538] BPF:No type found 01:34:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000035b00"}) [ 1206.202711][T14590] BPF:Invalid section offset 01:34:34 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x300, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:34 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x60000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1206.518479][T14613] BPF:hdr_len not found [ 1206.547625][T14605] loop3: p1 p2 p3 p4 01:34:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000ff00"}) [ 1206.592195][T14605] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1206.687402][T14605] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1206.710136][T14720] BPF:Invalid section offset 01:34:34 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2800, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000140)=0x2, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000002400e50d000011000000000000000000", @ANYRES32=r5, @ANYBLOB="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"], 0x38}}, 0x0) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0xbea03ab84224a414, r5, 0x32}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1206.735829][T14605] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:34 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x500, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:34 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x68000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1206.969004][T14777] BPF:hdr_len not found [ 1207.135255][T14909] BPF:Invalid section offset 01:34:35 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000ffffffff00"}) 01:34:35 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28739, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:35 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x600, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:35 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="c4e1b77cad3f5fdac10f320f30660f3882af724d0000c74424008fc4bd879a008000007f00c7442406000000000f011424f30f0907013a360f06c4c18d72d68366baa100ed", 0x45}], 0x1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) fcntl$getownex(r3, 0x10, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000080)='/dev/kvm\x00', &(0x7f0000000140)='/dev/kvm\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1207.466410][T14960] BPF:Invalid section offset [ 1207.486441][T14962] BPF:hdr_len not found 01:34:35 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x74000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1207.594188][T14972] BPF:No type found [ 1207.598726][T14968] loop3: p1 p2 p3 p4 [ 1207.617577][T14968] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1207.643530][T14968] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1207.679501][T14968] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000200"}) [ 1207.871757][ C1] net_ratelimit: 17 callbacks suppressed [ 1207.871767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1207.883298][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1207.891811][T14984] BPF:Invalid section offset 01:34:35 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:35 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873a, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x64b19, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x9, 0x0, 0x100}, 0x0, 0x1000000f, r5, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000300"}) [ 1208.203287][T15001] BPF:Invalid section offset [ 1208.337620][T15004] loop3: p1 p2 p3 p4 [ 1208.379860][T15004] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1208.388140][T15004] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1208.402181][T15004] loop3: p4 size 32768 extends beyond EOD, truncated [ 1208.431759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1208.431777][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1208.437680][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1208.443604][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1208.511802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1208.517718][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:36 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xf8000000, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000400"}) 01:34:36 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x700, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1208.616854][T15004] loop3: p1 p2 p3 p4 [ 1208.657262][T15004] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1208.664096][T15227] BPF:No type found [ 1208.679915][T15230] BPF:Invalid section offset [ 1208.753051][T15004] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000500"}) [ 1208.814168][T15004] loop3: p4 size 32768 extends beyond EOD, truncated [ 1208.821424][T15236] BPF:hdr_len not found [ 1208.831794][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1208.837647][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:34:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x101ff, 0x0, 0x6000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:36 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1209.052092][T15248] BPF:Total section length too long 01:34:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000600"}) [ 1209.232409][T15256] loop3: p1 p2 p3 p4 [ 1209.237229][T15256] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1209.254754][T15256] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x29}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1209.352419][T15256] loop3: p4 size 32768 extends beyond EOD, truncated [ 1209.530958][T15304] BPF:Total section length too long 01:34:37 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873c, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7ffffffe}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:37 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x300, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\a\x00'}) 01:34:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400800, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000180)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1209.762739][T15484] BPF:Total section length too long 01:34:37 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1209.783826][T15480] loop3: p1 p2 p3 p4 [ 1209.842342][T15480] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1209.851416][T15493] BPF:hdr_len not found [ 1209.898613][T15480] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1209.954101][T15503] BPF:No type found [ 1209.962060][T15480] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\b\x00'}) [ 1210.137109][T15511] BPF:No type found 01:34:38 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873d, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:38 executing program 4: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={0x0, 0x1}, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x4) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000080)=0x1, 0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x82000, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r3, 0x800c5011, &(0x7f00000003c0)) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) openat$cgroup_procs(r4, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xf2) write$P9_RVERSION(r5, &(0x7f0000000400)={0x13, 0x65, 0xffff, 0x4b, 0x6, '9P2000'}, 0x13) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x1, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = dup2(r7, r8) getsockopt$inet6_tcp_int(r9, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000280)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x2ce, 0x5d}, 0x2000, 0x200, 0x0, 0x9, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:34:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\t\x00'}) [ 1210.482778][T15520] loop3: p1 p2 p3 p4 [ 1210.502853][T15520] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1210.555856][T15532] BPF:Invalid string section [ 1210.591155][T15520] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1210.636506][T15520] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00001900"}) 01:34:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x3}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:38 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x500, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:38 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x60ff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:38 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873e, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000300"}) [ 1210.948223][T15750] BPF:Invalid string section 01:34:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1211.103103][T15760] BPF:hdr_len not found [ 1211.128845][T15763] BPF:No type found [ 1211.204400][T15772] BPF:Invalid string section [ 1211.222964][T15766] loop3: p1 p2 p3 p4 [ 1211.228828][T15766] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1211.248056][T15766] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1211.284435][T15766] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x5}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00005b0300"}) 01:34:39 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2873f, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp, @sack_perm, @sack_perm, @window={0x3, 0xa1, 0x7}, @timestamp, @timestamp], 0x7) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000001740)) socket$inet_udplite(0x2, 0x2, 0x88) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r6, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r6, 0x40000000af01, &(0x7f0000000380)) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x4, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) ioctl$PIO_UNIMAP(r7, 0x4b67, &(0x7f0000000580)={0x1, &(0x7f0000000500)=[{0x4, 0x81}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x14, 0x6, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x2cad616bd45ae329, 0x4, 0xb, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00f\xd3\xb3\xc7w$-:J1m\xfc\xa7\xd6\xec\x90\xb0\xbe_\x02\xd7\x815:\x11\xed\xdd\xb2\xc6', 0x8, 0xa6, &(0x7f0000000200)=""/166, 0x41100, 0x1, [], r9, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0x7, 0x4, 0x9ff}, 0x10}, 0x78) ioctl(r8, 0x800000000008982, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 01:34:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000500"}) 01:34:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1211.842941][T15895] loop3: p1 p2 p3 p4 [ 1211.850728][T15895] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1211.930275][T15937] BPF:Invalid string section [ 1211.935387][T15895] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1211.976282][T15895] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x600, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1212.115686][T16112] BPF:Invalid string section 01:34:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000600"}) 01:34:39 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e00, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:40 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28740, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x8}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1212.293959][T16123] BPF:No type found [ 1212.315439][T16126] BPF:hdr_len not found [ 1212.328003][T16110] 8021q: VLANs not supported on lo 01:34:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x240, 0x0) write$tun(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x10d) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x5, 0xf7, 0xc5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1212.420150][T16135] BPF:Invalid string section 01:34:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\a\x00'}) [ 1212.481597][T16137] loop3: p1 p2 p3 p4 [ 1212.499767][T16137] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1212.539643][T16137] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x48}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1212.589843][T16137] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:40 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28741, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1212.916927][T16161] BPF:Invalid string section 01:34:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\t\x00'}) [ 1212.991762][ C0] net_ratelimit: 20 callbacks suppressed [ 1212.991772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1213.003241][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:34:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0xc7a) [ 1213.168067][T16197] loop3: p1 p2 p3 p4 01:34:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4c}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1213.212770][T16197] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1213.231847][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1213.238616][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1213.251055][T16197] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1213.325619][T16197] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:41 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x700, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:41 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000001900"}) [ 1213.423020][T16383] BPF:Invalid string section 01:34:41 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe0ff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x456240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:34:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x60}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1213.655184][T16399] BPF:No type found [ 1213.662992][T16400] BPF:hdr_len not found 01:34:41 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00?\x00'}) 01:34:41 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28742, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1213.883149][T16414] BPF:Invalid string section 01:34:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x68}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1214.042907][T16420] loop3: p1 p2 p3 p4 [ 1214.052508][T16420] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1214.067884][T16420] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1214.082201][T16420] loop3: p4 size 32768 extends beyond EOD, truncated [ 1214.111779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.117620][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.174622][T16433] BPF:Invalid string section 01:34:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00@\x00'}) 01:34:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28743, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x3, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e300000000e340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000dfeb46f51dfa4e4e097fc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000002400e50d000011960000000000000000", @ANYRES32=r4, @ANYBLOB="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"], 0x38}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x16, r4, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) [ 1214.652143][T16528] loop3: p1 p2 p3 p4 [ 1214.671797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.677582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.681874][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.689346][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.698166][T16528] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1214.734285][T16528] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1214.817847][T16528] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x60ff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6c}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000035b00"}) 01:34:42 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffe0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1214.984600][T16665] BPF:Invalid string section 01:34:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28744, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x20200, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x1) [ 1215.091853][T16670] BPF:hdr_len not found [ 1215.109855][T16675] BPF:No type found 01:34:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x74}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000ff00"}) [ 1215.439585][T16691] BPF:Invalid string section [ 1215.472710][T16688] loop3: p1 p2 p3 p4 [ 1215.482159][T16688] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1215.514807][T16688] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1215.546483][T16688] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7a}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000200"}) [ 1215.775837][T16704] BPF:Invalid string section 01:34:43 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28745, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0xa8802, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000580)=0x9, &(0x7f0000000540)=0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x10001, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x3, 0xfffffffffffffe70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDRV_PCM_IOCTL_UNLINK(r4, 0x4161, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r7, 0x890c, &(0x7f0000000480)={0x0, @rc={0x1f, {0x3b, 0x7, 0x20, 0x6, 0x3d, 0x9}, 0x6}, @hci={0x1f, 0x0, 0x1}, @ethernet={0x306, @broadcast}, 0x3ff, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000440)='erspan0\x00', 0x2, 0x5, 0x3}) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, &(0x7f0000000300)=ANY=[], 0x6) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r9) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000780)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0x37) r10 = accept4(r6, &(0x7f0000000140)=@ethernet={0x0, @broadcast}, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_inet_SIOCDARP(r10, 0x8953, &(0x7f0000000380)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, {0x1, @random="994c5f6fb9a5"}, 0x4, {0x2, 0x4e21, @broadcast}, 'rose0\x00'}) r11 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$DRM_IOCTL_AUTH_MAGIC(r11, 0x40046411, &(0x7f0000000500)=0x7ff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:43 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e00, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xf8}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:43 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000100"}) [ 1216.115570][T16917] loop3: p1 p2 p3 p4 [ 1216.173355][T16927] BPF:hdr_len not found [ 1216.211920][T16917] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1216.276835][T16934] BPF:No type found [ 1216.290363][T16936] BPF:Invalid string section [ 1216.312474][T16917] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1216.326811][T16917] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000380)={{0x4, 0x0, 0x80, {0x1000, 0x2000, 0x1}}, "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", "e59f0250c8e778a2b3e19e99e8a4b928c69461fa2d2bcdb9977ec38d18d878aa23991c27c228119fc0434de69af7de4d6de481411e16538cd0959c82b11d3853d8a4fd9c7ac0b9a387025fbdd016a2be7cdd30e715adfd9b2f7d6abe86dfc398486bf22ff75e66221951c148249181f9ca25059e33deea311bc49f617685b8e2b46e4971058ff03e4b21bc3993ac5fd3d723ebbc0b9ea03713fac03f579cf774b8c076b95d8d47725c77a90f9b195397911a840c644d493a6da2eb25772cf6fce91b7cfe61938021eaa1191033f7fd2b4da5f5e79fdff7784a141cfadbfd780c6a9ae8e84730836d87bbc345da48cb76d7d6d7244fe1ffeaa133d8c6b7f3338fc24f6d24427c53f6b81f92bb18d9292c5759e43b4f6b33eb5354892989fde2c5360b221e10452cf1b90e2fc90ccecb1c501ad2320f8411aae1077bfa03b771049814ed0a3f98484d563bdf851e4b8af367b460e158554e7844875de22381dce49c2382e21cdff088ff9547002f380951d69e5c34fbdc2ba164aa866568cbcd9034f3d39172a4089bfdf5bc5e8591a8b21978a6f96366ec6bf31fad4d71bc3a10ab0beeea35b4f12af78f40809c151472d2f187262b1812b1ce78c3f74ff4f4546a25b64953e246223d616ed29aaa8dd0cd6dc05ff72b7bfc6e75c96310e9d67f97e609f8de34098786181c216d85eac4dde98ae5e103d6a3d27bad32ceb696cba19b04df8f33e8ac207ce4870bef6c639027fc454af3e09e6c49347b6a222961b82112f6eef41b345a23945743e2df987cdae4e54dbadc08ac212a8561eec49019765966c046ed84d248a75726e0509222ba59f84d37c3f65a7844a0f463ce7092690528c9d0f70259e2204587dda9a278fd1eb00eea988706c32360d8a7e22ceaf2c61f5c0c7bebe5b191215d47183b75b535f1a7c531d83099786e7cbee48057161420b91c0a736d53dc7e63147bb6eddcf30498325020a8624dc6605fae5cdec4217f85923b2c0390c1e788d1eebe7a6fc4ea283e1462e7dcc3e558528d423e17dfc5eee769c71e2baf5d106fbdada283a315977e6b1d82465774bd64faa38553a3e7722876331a7c8a484c224e28e525a7692dd96e564e0ca25bb301eb567e0d265ed9cb14cb3f86596872684d7606ad09b1d5e66d6549771e6f54bcee493265c22b15d02863c3706604ce2c649b66f19aa847c0318eb8ab0e5e4b596f12e28fdf9c75a12e7b15ed345d791d8f26c976a55494fdbc4a56e30ba9426aa2e0ae9a1c2ff53adb5295368c2f2fa4c33347bc24d5a36eb75cf260ac94d8ce4cb04f62c0748af01387140f1e96ba06b24b35b7f76d7608944efaca36ffff40f817da70bf0fe488bb4fb6f0627dff69b185fb3af81c5bb0349fd689f62ab2566122b24d01378e30d91158a43b49760105a6bae511422cda525de6cc78211a4b8069b9916dd9c988a962adc2c7f48ad1d6cc950d7aceff85da44acdd73da3d4077b84e9b6ffb4b74fcabb7bdde3c0641d2b9c33f6c1d8954c8834109ea695148e8e45d0fa6e7e6df6ef37e66988bf53e81cc33bc4aa32fec74fade70a235bb65f805376bd02adc306c520b9c321a4db7bd003aded42a8f563f9bc549689f7fa37e4747dc6c9349af32166eea3a4f8c22021fbb928069e9d1428874bfbced1df434dda9a023e51c91f28aa499b7d27428616e6ba95b0dac4ee66e0059af12f9887644b53be0c13e6d0aed301b10bddca9e37015f920cdf97d10c212d9503a24e1969c77c15a5529d69c195167aa5371ca91d6d8e73fa9fdbf090aabd012b7085a815cbdce06cb5f364ec0b0c34adc3595016d45ac96060c19a951c4fb892754392eb490b68cff603ab1ddd56dc5fcab2bfff1281385983960d6e3887ba2378e938310d0a3055b04f31ce7aef167fad90ff68b6801243d6651fdf03ad6db56efefe2061fd6a4bccca61f8e7769b9ef57098edd2adfd4fe034a86bb5eadf7e51b390d3c0d603daef5a4217f221eb1db08cd1985f5518e427ab6157b8d8c5a8e0b7b6c35847dbe953a123505f8dbc48a1a82909ace44496ba64d1faa35b3f8032ce43b43fd4a45d0afdac9fb5b34b7292f89ae3fbb5a9074befab860d03cc453287f8a910b32281508d5cfa6f89e097fdfe815dd599c97fec3e1328f79fdfb8321be7be039985cca9910471d19c966ccbebaa6b714b43b7cd3f385498ae6c34a1c2daddcdd05bc7a8fc7695f412778889105be29ef89d3e7b094da8767cb9778520c4eb23f2a4b14c813722f87c3c41838943a3df5e2e63135575002b3261281455979b01dd5daeec50fb4aab201ca6628c6bc77149aa4a341a6eacb6ceb43f72fcec2dc799ada2072fff63e783de9fd26edf2d17b7a7ec703be2762890c870324f0b277959b387422e8aa93e226184fcd8c479ff2ce21ee81af0d14769b107fef1287c7069f6e259b129f2b4667cd46bae9e47622d274d526ef758e45c4d337ccaed0f61c28eed924f010274b0a8b51762b9f45248b9c11e74b5d4465b48c277413c5be7e7c81b38fb56bd72831d070ac822ce68a94a608187f7f4777c9dc605534fe5bf2f4757ae9dee1b5649ba4a0f4ff9ec3d5fdd2b6f79f897b3892629c6a27a235eb49defdbd4cae2bef121e0942e3e3269a7fd348d4d11d1dff9a7bcc73baf1f70cfcad4568841701c6fe03471747c6be5cb3dce7086e6079a63c291f9f567b4d2da09a05def384c03831e7ee222fc0ebf0ff32138149e27eb91a747891aafec37480d583ba1fa5d553f10761131a7c1a79bad89ec620d8e469bd7c083faf936776968bed94a03d847d308a67887df0b2a6da9d717022cefed83e4de97fc826f2d75f816a79476f97adf6a0dc04e634c648aa6b6890396c9eb4a59997cce26023c3e221d7241d51561f293fa6a904ae9403c7e72701ae60a18b2134fd55e8c62a30d06455e3e17ada7c2ef30ce90474bab682693474a23fb1f229eecc207f91a9f5fd13db8bc7458219411141847f04fbd28247a1def0db2729eb953fc7bec41cbef6496d591cef36e766673986197105ac48788139edcda2e88a492075c424a4c3192e6bae71cda2a11ec5ba255e806ad601874a9ab87aeb8bd0a93afb71e1ff153b14fb26f3786a427d33ac0dcce8f4a55bb20bda0b2259fc66724dba8cca99f054a99eae7bcb8be63324a5cffb26a7011a3acd947f6baa6fc127ba354b5a694c80fb10706660463cc23c74d77199a26c55268428a0aaf8a435fac4ccb65eca61801e8d503acc4ec5ccf56623138253f2e4d0a2863131c7f12fa92eb830cbb43471ed833aa1daa6085967efe63a5ee8fda5a58a445870c09f5065c0babafb90e3a45c8d2485c98abc7d7a64f8bfc4b535920ffb26e90bab36a56886544a3e82775436d65749c80458fa5b42c2f4a44fb064ff61ecd8646600c3c6bc6e857564f922c2625f1aa3313e8d2a3e1f1387f9a196cf250a38ec063403ba2fe1c7936bb4b4fe459748e469fea9d9ec1dde977b7ee883e9cc44107805bd4aa666fec4f4f052a11a8ff20de858ffae8a94804b274dcc3bb20c0ef571c80f53c3fc4a4954479b2018c0193fa4db56b04aeaf5364a697f947c5a53e51a61b03ace1ed5340e2241d9e1a3ce76fee9ab960dde49d1d7853a1fe4ae291f360c42d53515b67af8e97ed26543c4b5aff77c9731aca9e2718ed2e35da508a0b3e55642e7b70d2c35487e0f1ed2b4f01eb63f2c6aa6ef80433a4e0cecc690237d305514464759e3879756693318773f2ad5754c128a03de414a5f7b3885b7ea53258df7b02a881fd51f14bae24367b3e195f3cfb0c1e2402be7625636049ecc955a2d5a4abdb1bd7df7b5715aed50ba064746453fafe6c266eefc56dc3673700d5494e9a1abe2fb5672c855dc05bc7af7de6cf7d0c0d803703d68d3da085d95f572a21f234fb9250f417b37e923dab0968f8dca78217cb51f55cfe6bad13a05ca748590abbbcbf54b867d7abb6fd3be2798955d479a06cad96ad54db4edc52873645cf9509aa9e2c12b2ed8cd6079b5056a30e7a4313c5e7c13244b67e4af6e24701e36cc7d06122ff28ae253c3064fdc7521ca1a5851af998b6f0238bf7dac9453b103f92105b9e2c459dc5d2793dfe94a26bc385ac9acd66c68f9ef654a3f315a7ea4054255b713b337e2b6d9605ef3ac8d7ddeea88711c7ac59fff3ab4275231fbb38a6abc7323cf43f07bbccd298813d591520a8266f30f07b19844f8fcf0acb0cc9a8aee6939ba25d2ad26fe77c908b0d6ab964f32abba712a42b569237bbba5286556353dfd93ffca33f5ab8ed3829de03f37d6b3c7a510a1422110e0e4994abcab3fb5e869d453157e03b5a403734e72ae8a524774340a6647ff804bc3e5e23cc4465ffbba2c0bf0dca6faae807212e68ed1e5d12f8d66e0e5dc55ea7d14bdf4e3ee7a90a518333d0b8023544a7b216821c2b3517bae86063ca7a920b18cb0efe9ef8d5fd2da6450a606367b9640e9bfe242f2dc3e1ce43e8a8646c9ec2b1f5bd2efd5c296543ecd3db31af936aef1b050ae24c646e5969488bf7a134349ef7434eb17beb99b8ae472b32bd2de925e665a79ebffae71dc30b60be04b59de281cd9abed0afe49783bca0f8423d166f8c2569d6930b399365d586411519d56ff610034b52551c075546daa684ab86e8a55e94896612460ea36cfd1c140e900dce89df0f554ab7c176b8e93db17282bde8a6c92011bd7652a304bf173c3f9975def1d9185a8ba3c8ae76b047a78292fddb2fc9d49d0382300e6f83a3cef212292353547f6f412abc45004bf8deb790ade351660a499e575feee0e4686eec8cf0ccc24edb8ffd8f92941750f65d0b847eaf88aefba67c9a728183d6c2ea9dff23939598c25b4086df5b19e033c4c331c12c38c0e4d51d5ba9fa5b2ed223f6a55e4be2d57c154b9d0c7ea588e0f5688641409cd869ab04a289ec2a3ef60bf25909657875f33cdc4074e39584aebc9957f9a6076a257c376664368a0144eb57d4f0bfe05ab547ce3ea7cec37b8c204fe2bd3dd4c89a5d2a01660748f22d2bb7cb42214bfa6bcb930685065f29dfa4a54bf922ef21f57e864b22dafaf868fccc3d8f778145afb3bd6fc38d75649683dcbaa6e09856dc331632c67cc9cd527f533ce58420932da476338ee34dba4c81072be02d26d0cfabd9a234c077215a07285c4c78a74cb480e6e398a7cf2c4ea89611741ba5676342c34e25f7041f65b29b69a83ae3ee9eb7594d59804bf381aaf1cf2d9c70b3f5d55416e4eda8ef3eeb960f011f5b2079ef36909f7aa26d5416cba8bbe0681e1a93c023fd6049101afc0e33854fdf95be66d8baf7844c9d96bf6ff0f4f789a7a3c71eaa845d8c09f13d7f4b5db6c504b65ed18b534801cbb0e85636fff5cac29729a617a7f04acb1cb054eed9f08c863485e6d2afbd227baf5b04dda1a7d8eaaa66a2b0c990770d2e854297cdb6bdae0295531dceef8bf33aa6033bc9b4d167e8bafd40c59913b689b0693cb0b6f3d3b9215f1d880d5770420e064be23428b9f93fea84d6ebd069de4b2114fa6a0c36261a53ab28eda9a4d2cc89d644e331c76e720749869d66d6688e421bf065f4cdc1fef69bec9cb74bb6e8559934d804c88b9239895bb903efc283bd2ae280f0e0133700006bf52991bdf67c43f25275556a0846867f706f1acc30a3bc758e2f339e182362b814c14f7d26808cd30dfedb3c2b014b3c7b6b0f8824be93848a904bf2e44dfe05ae4dcfceb47f40678677b9d9c3aa8b75ae66d3efa79db482d2cb46d7d2b6a"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:44 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000200"}) [ 1216.573973][T16944] print_req_error: 4088 callbacks suppressed [ 1216.573996][T16944] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1216.612095][T16917] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 01:34:44 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28746, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1216.684951][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.695978][ T2502] buffer_io_error: 4068 callbacks suppressed [ 1216.695989][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1216.737437][ T2501] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.748671][ T2501] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 1216.757573][ T2501] blk_update_request: I/O error, dev loop3, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.768514][ T2501] Buffer I/O error on dev loop3p1, logical block 2, async page read [ 1216.777277][ T2501] blk_update_request: I/O error, dev loop3, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.788170][ T2501] Buffer I/O error on dev loop3p1, logical block 3, async page read [ 1216.796457][ T2501] blk_update_request: I/O error, dev loop3, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.807361][ T2501] Buffer I/O error on dev loop3p1, logical block 4, async page read [ 1216.818088][ T2501] blk_update_request: I/O error, dev loop3, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.829005][ T2501] Buffer I/O error on dev loop3p1, logical block 5, async page read [ 1216.837263][ T2501] blk_update_request: I/O error, dev loop3, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.848367][ T2501] Buffer I/O error on dev loop3p1, logical block 6, async page read [ 1216.858538][T16953] BPF:No type found [ 1216.878476][ T2501] blk_update_request: I/O error, dev loop3, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.889540][ T2501] Buffer I/O error on dev loop3p1, logical block 7, async page read [ 1216.898842][ T2501] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1216.909796][ T2501] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1216.918268][ T2501] Buffer I/O error on dev loop3p1, logical block 1, async page read 01:34:44 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000300"}) [ 1217.035657][T16959] loop3: p1 p2 p3 p4 01:34:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1217.077607][T16959] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r7, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r7, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000080)={r7, 0x200, 0x0, 0x6, 0x6, 0x6}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r8, 0x80000000}, &(0x7f0000000480)=0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r9) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000380)=""/200) 01:34:44 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1217.121930][T16959] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1217.141505][T16959] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x1000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1217.271274][T17180] BPF:Invalid string section 01:34:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x3}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1217.383623][T17183] BPF:hdr_len not found 01:34:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000400"}) 01:34:45 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28747, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1217.452640][T17188] BPF:No type found [ 1217.585759][T17256] BPF:Invalid string section 01:34:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000500"}) 01:34:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x4}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1217.786112][T17305] loop3: p1 p2 p3 p4 [ 1217.801383][T17309] BPF:No type found 01:34:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000080)=0x8, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1217.826743][T17305] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1217.853654][T17314] BPF:Invalid string section [ 1217.857939][T17305] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1217.922955][T17305] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x5}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000600"}) 01:34:46 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28748, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1218.264236][T17394] BPF:Invalid string section [ 1218.271782][ C1] net_ratelimit: 18 callbacks suppressed [ 1218.271793][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1218.283323][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1218.476116][T17440] loop3: p1 p2 p3 p4 [ 1218.481455][T17440] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1218.492428][T17440] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:46 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x3000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x6}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f0000000140)={0x8dc7, 0xc, [{0xe, 0x1}, {0x4}, {0xc}, {0x3}, {0x3, 0x1}, {0x9, 0x1}, {0x2}, {0x2}, {0x6, 0x1}, {0x4}, {0xf, 0x1}, {0x3, 0x1}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1218.547489][T17440] loop3: p4 size 32768 extends beyond EOD, truncated [ 1218.598706][T17452] BPF:Invalid string section 01:34:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x7}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1218.693259][T17539] BPF:hdr_len not found 01:34:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\a\x00'}) 01:34:46 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28749, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1218.831836][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1218.837625][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1218.841751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1218.849112][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1218.871441][T17568] BPF:Invalid string section 01:34:46 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x3000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1218.911787][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1218.917637][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x8}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:46 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000080)=@generic={0x2, 0x1bb, 0xff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000380)=""/198) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1219.079990][T17581] BPF:No type found 01:34:47 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\b\x00'}) [ 1219.231785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.237612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1219.244203][T17587] loop3: p1 p2 p3 p4 [ 1219.253551][T17587] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1219.272414][T17587] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1219.298303][T17594] BPF:Invalid string section [ 1219.332270][T17587] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:47 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00'}) 01:34:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x48}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1219.721545][T17713] BPF:Invalid string section 01:34:47 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:47 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874a, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x0) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000009c0)={0x9, 0x401}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000080)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./bus\x00', 0x9, 0x9, &(0x7f0000000880)=[{&(0x7f0000000380)="d008ae2f1aacc071d650dc938bdeb1389e0c83ce3220bae743eba8664e5a7df91781b6e3e01affffb442dd4853dd4aa85d5f13459f60f25c3bee2a9996c77624235ae35e74b6ae5867614b05c58d61ba5f6a9bb59e7ac8bbbb44f70e47b5acad17ed8560359455e250825a8c2b7e6249", 0x70, 0x3ff}, {&(0x7f0000000400)="6cf69ef0991f23141f89cd197f3d71d7b31a29b87024b4b5aff4f5467dd0e5f4658a52bded3272dca17a42ee905ef3ad8d7cc549796fcaee0591253b5cb5b24e22e50b20e44975acf65ead40e927c2332d35", 0x52, 0x4}, {&(0x7f0000000480)="045bf61f4d70c43f95596786477dd9b873c801260bbe2d81909cdd344ba8c23d25d59717125715598b3d701e7c3e890da8b77fa5d5fc0585b0b9911cbb497a3beadbb4c7ca7d8c2eae56d5bdc758c2723c79305bb20ca32c86e5a41261dab1c6144f00259704fcc76be192ed088e4c33c278cfaaf714e4490577f04508046be61336b38237937a9141bac415205c812ac60156ba22d17a2286b6", 0x9a, 0xf3}, {&(0x7f0000000540)="2d4ab5e2597af4edb621f79cfc613599045f366b7f2192f280038d16fb8a5092ea87a92071555e5c3190138a687dfcaa12d408b40ae513ec9bd0f6ccda517cfb274f9ba26f5e0d0384d364b115149189f4c1b2b9441471733d0ae10b13db272eba18bff681c79e6048618c42c0fbed5e79d761e41014987470eefd523674aaa020b70b3196d66331e1c6e793455ce7110880bd582cef7987b272ddf7ce6a0873c2b5e831f51db20cb99d8ab30b71bd6f87c207075fd282f814948d2334c115905d3ae5d30ee7f98763", 0xc9, 0x80}, {&(0x7f00000001c0)="ec758c79beead45b184129d35566a972a0f02b0b167809b5d90c1a152de274f40d", 0x21}, {&(0x7f0000000640)="05f8f92210a265bd2289d4118a3f390f7d6571bec92cfef7bfa1cdd1385e7e57b04200968c619a259618b75968a427e7fa59ff074143ee0b6c761bebbdecef7d251e1c7772ce8f4dac192cc89948e8e4523a8711510a9f1efcfb8a8b65cea550d967b751432e141eaf", 0x69}, {&(0x7f00000006c0)="f5a66b2cf07311aa7f0e85fc173b36b5416b2f5eccc66f63d185a6e3cb9ecd79633bff136598ae5b1fdda1abb5ed246a9743c7bbcfe03d38105ed1271fd4557cabf19a85e8156742cc1d4b6fe025b76667ddbdf786469cb83a0940916d4696fcc33b9b1b686663aac42ed20c509e6646efcdd4ee364600c9eadd6612e425eae152fb3ca57825a0e59d3234523015f7f5caf5adf2803b92aefa8960ce0f31a57e2954d41d459244082de77365f1ff23cd659655ce29c662a033bbdac6abb11a2811ab8da145e32a0e08fc616c100dfa300d813ed5bd804c263b300b196d19432774", 0xe1, 0x4ca33ecf}, {&(0x7f0000000280)="0f6975f604b45c06ecf898f0e940ac5d6ba2b10f01bcb17999933f42d5840f20781a8ce574df2e", 0x27, 0xfffffffffffffffc}, {&(0x7f00000007c0)="988780b8335f543f3713d7ab82506c569dafa5f04a748a8a9bb5d4f6bb5ea4b0055cca02b5f48c057a7513f5afab4d68b23333b07daa650a5a7c6adc05a3147fd7b1a020a5c5e0b41edc975a352daaf73de4a3bb419ce3f2a64dfe3dc7dba6f4ba9f95fa4e58f84e924763367a519c4f4409b390f25415b024d76e4252f156d0be053b86b46551b7b4f9df0e15a60e1deef144f2bb0f868ebaf053793d9091", 0x9f, 0x3}], 0x4b, &(0x7f0000000980)='/dev/kvm\x00') ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:34:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x4c}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:47 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000001900"}) [ 1219.960641][T17757] BPF:Invalid string section [ 1219.976904][T17748] BPF:hdr_len not found 01:34:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x60}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1220.045873][T17773] loop3: p1 p2 p3 p4 [ 1220.055552][T17773] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1220.082310][T17773] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:47 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x4000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1220.106116][T17773] loop3: p4 size 32768 extends beyond EOD, truncated [ 1220.109633][T17840] BPF:Invalid string section 01:34:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x68}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1220.213697][T17846] BPF:No type found 01:34:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00?\x00'}) 01:34:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1220.426764][T17860] BPF:Invalid string section 01:34:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000140)={0x3, 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000080)={0x2, [0x0, 0x0]}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) getpgid(r5) clone3(&(0x7f0000001540)={0x100, &(0x7f0000000280), &(0x7f0000000380)=0x0, &(0x7f00000003c0), {0x3b}, &(0x7f0000000400)=""/199, 0xc7, &(0x7f0000000500)=""/4096, &(0x7f0000001500)=[0xffffffffffffffff, r5, 0x0], 0x3}, 0x50) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, r6, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x6c}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1220.724937][T17870] loop3: p1 p2 p3 p4 [ 1220.730329][T17870] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1220.748954][T17870] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1220.780477][T17870] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:48 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x5000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00@\x00'}) 01:34:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x74}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:34:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874c, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1221.213526][T18196] BPF:hdr_len not found [ 1221.243467][T18199] BPF:Invalid string section 01:34:49 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x5000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000035b00"}) 01:34:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x7a}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1221.404452][T18210] BPF:No type found [ 1221.443139][T18203] loop3: p1 p2 p3 p4 [ 1221.482386][T18203] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1221.580644][T18203] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1221.604483][T18203] loop3: p4 size 32768 extends beyond EOD, truncated [ 1221.661625][T18219] BPF:Invalid string section 01:34:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000ff00"}) 01:34:49 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874d, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0xf8}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1222.076563][T18259] BPF:Invalid string section [ 1222.112911][T18238] loop3: p1 p2 p3 p4 [ 1222.137355][T18238] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1222.163532][T18238] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1222.201451][T18238] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:50 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x7, 0xf9, 0x8}, 0x20) 01:34:50 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000200"}) 01:34:50 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:50 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x6000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x48808, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_config_ext={0x1, 0x4}, 0x2000, 0x200, 0x0, 0xf, 0x2, 0x0, 0x100}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x840020}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)=ANY=[@ANYBLOB="92000000", @ANYRES16=r8, @ANYBLOB="01002abd7000fddbdf25020000007c0005000800010069620000080001006574680008000100657468001c00020008000400010000000800010015000000080001001400000008000100696200003c00020008000200ff01000008000400182e0000080001000e0000000800040002000000080002000000000008000300a60b00000800040000020000"], 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x4000) dup2(r4, r5) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r9, 0x0) r10 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r9, r10) ioctl$EVIOCREVOKE(r9, 0x40044591, &(0x7f0000000300)=0x6) setsockopt$inet6_MCAST_MSFILTER(r9, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000003a000000000a004e22ffffffff00000000000000000000ffffe0000002f9ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000080000000a004e2400000fc900000000000000000000ffff7f000001a9a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e21000000a9ff020000000000000000000000000001ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22000000070000000000000000000000000000000109000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000b470000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000fe8000000000000000000000000000aaff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000200ff01000000000000000000000000000108000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000008ff02000000000000000000000000000109000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000004fe8008000000000000000000000000bbffffff7f00"/1168], 0x490) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) r11 = getpid() fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000980)='trusted.overlay.redirect\x00', &(0x7f00000009c0)='./bus/file0\x00', 0xc, 0x2) sched_setscheduler(r11, 0x5, &(0x7f0000000380)) getpgid(r11) sendmsg$IPVS_CMD_SET_INFO(r9, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc1000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d00)={0xf8, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x0, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x0, 0x2, 'veth0_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x0, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x0, 0x4, 0x26}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x0, 0x8, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x0, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x23}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x40f4431edf1840e3}, @IPVS_DEST_ATTR_ADDR={0x0, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0xfffffffffffffea7, 0x4, 0x4}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x0, 0x5, 0x8b9}, @IPVS_CMD_ATTR_DEST={0x24}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0xc0, 0x5, 0xc53}]}, 0xf8}, 0x1, 0x0, 0x0, 0xcc8c0}, 0xc896) ptrace$pokeuser(0x6, r11, 0x2, 0x7) 01:34:50 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874e, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1222.439660][T18456] BPF:hdr_len not found [ 1222.446953][T18454] BPF:hdr_len not found [ 1222.495069][T18460] BPF:No type found 01:34:50 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x18, 0xf9, 0x8}, 0x20) 01:34:50 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000100"}) [ 1222.698052][T18470] loop3: p1 p2 p3 p4 [ 1222.707711][T18470] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1222.781961][T18470] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1222.794610][T18478] BPF:No data [ 1222.821356][T18470] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:50 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x29, 0xf9, 0x8}, 0x20) [ 1223.055322][T18491] BPF:Unsupported section found 01:34:50 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2874f, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:51 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000200"}) 01:34:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1000000, 0xf9, 0x8}, 0x20) [ 1223.311431][T18498] loop3: p1 p2 p3 p4 [ 1223.316635][T18498] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1223.332462][T18498] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1223.352424][T18498] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x2000021a, 0xf9, 0x8}, 0x20) [ 1223.391806][ C0] net_ratelimit: 22 callbacks suppressed [ 1223.391816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1223.403266][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:34:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x1], 0x0, 0x80}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:51 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:51 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1223.631753][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1223.637551][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:51 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28750, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:51 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000300"}) 01:34:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x2}, 0x20) [ 1223.803007][T18726] BPF:No type found [ 1223.849397][T18734] BPF:hdr_len not found [ 1223.988477][T18736] loop3: p1 p2 p3 p4 [ 1223.998033][T18736] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1224.015242][T18736] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1224.028941][T18736] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x4}, 0x20) 01:34:52 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28751, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000400"}) 01:34:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x10}, 0x20) [ 1224.511771][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1224.517566][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1224.542404][T18764] loop3: p1 p2 p3 p4 01:34:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x204800, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000140)={0x5, 0x4, 0x8000}) [ 1224.555954][T18764] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1224.599695][T18764] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:34:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x29}, 0x20) [ 1224.641547][T18764] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:52 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:52 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x20000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000500"}) 01:34:52 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28752, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1224.943050][T18991] BPF:No type found 01:34:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x2f}, 0x20) [ 1224.963642][T18994] BPF:hdr_len not found [ 1225.071802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.077624][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.081821][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.089099][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:52 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0xa) [ 1225.201831][T19003] loop3: p1 p2 p3 p4 01:34:53 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000600"}) [ 1225.238744][T19003] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1225.314031][T19017] BPF:hdr_len not found [ 1225.318436][T19003] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1225.337465][T19003] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:53 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe0ffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x25) [ 1225.532487][T19026] print_req_error: 283 callbacks suppressed [ 1225.532508][T19026] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1225.560200][T19027] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 01:34:53 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1225.560376][T19028] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1225.589977][T19025] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1225.602424][T19003] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1225.631574][T19035] BPF:No type found [ 1225.643862][ T2502] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1225.649464][T19038] BPF:hdr_len not found [ 1225.655188][ T2502] buffer_io_error: 282 callbacks suppressed [ 1225.655210][ T2502] Buffer I/O error on dev loop3p2, logical block 16768, async page read [ 1225.674280][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1225.685205][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1225.693567][ T2502] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1225.704883][ T2502] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 1225.741944][T19011] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 01:34:53 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfeffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x29) 01:34:53 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfeffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:53 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28753, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:53 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 01:34:53 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) epoll_create1(0x100000) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1226.121085][T19257] BPF:hdr_len not found [ 1226.151092][T19260] BPF:No type found 01:34:54 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xff600000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1226.252944][T19277] BPF:No type found 01:34:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDCTL_DSP_GETISPACE(r5, 0x8010500d, &(0x7f0000000080)) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) ioctl$EVIOCREVOKE(r7, 0x40044591, &(0x7f0000000300)=0x6) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r8, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x3, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r9) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x8, 0x200, 0xeffffffd, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1226.283728][T19267] loop3: p1 p2 p3 p4 [ 1226.299219][T19280] BPF:hdr_len not found [ 1226.308854][T19267] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:34:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x2f) 01:34:54 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffe0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:54 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1226.345701][T19267] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1226.414779][T19267] loop3: p4 size 32768 extends beyond EOD, truncated [ 1226.468702][T19290] BPF:No type found [ 1226.546011][T19297] BPF:hdr_len not found 01:34:54 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28754, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1226.842534][T19306] loop3: p1 p2 p3 p4 [ 1226.847274][T19306] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1226.872392][T19306] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1226.895649][T19306] loop3: p4 size 32768 extends beyond EOD, truncated [ 1227.023694][T19311] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1227.039274][T19306] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1227.047718][T19312] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1227.064700][T19313] blk_update_request: I/O error, dev loop3, sector 16768 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1227.067603][ T2502] Buffer I/O error on dev loop3p3, logical block 16768, async page read [ 1227.088147][ T2502] Buffer I/O error on dev loop3p3, logical block 16769, async page read [ 1227.096744][ T2502] Buffer I/O error on dev loop3p3, logical block 16770, async page read [ 1227.108624][ T2502] Buffer I/O error on dev loop3p3, logical block 16771, async page read [ 1227.117045][ T2502] Buffer I/O error on dev loop3p4, logical block 16768, async page read [ 1227.125709][ T2502] Buffer I/O error on dev loop3p4, logical block 16769, async page read [ 1227.134185][ T2502] Buffer I/O error on dev loop3p4, logical block 16770, async page read 01:34:55 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xff600000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x60) 01:34:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffe, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000001900"}) 01:34:55 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28755, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1227.398970][T19426] BPF:hdr_len not found [ 1227.435238][T19422] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 01:34:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x60ffffffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1227.497586][T19432] BPF:No type found [ 1227.534848][T19434] BPF:No type found [ 1227.560854][T19439] BPF:hdr_len not found 01:34:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x78) 01:34:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 01:34:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x40, 0x1, 0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xe0b40, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r4}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r5, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r7, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r9, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r10) getgroups(0x3, &(0x7f00000001c0)=[r6, r8, r10]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x200, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r11}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}], [{@dont_measure='dont_measure'}]}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1227.779477][T19450] BPF:hdr_len not found [ 1227.841493][T19422] loop3: p1 p2 p3 p4 [ 1227.874182][T19422] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1227.898374][T19498] BPF:hdr_len not found [ 1227.904008][T19422] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1227.912595][T19422] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x200000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1228.124279][T19572] BPF:hdr_len not found [ 1228.284666][T30211] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 01:34:56 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfffffffe, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:56 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28756, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'irlan0\x00', {0x2, 0x4e22, @multicast1}}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000080)={0x0, 0x1, 0xffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x103ff, 0x0, 0x6000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:34:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x200001a0) 01:34:56 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:34:56 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x300000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1228.571365][T19689] BPF:hdr_len not found 01:34:56 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x400000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1228.643447][T19691] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 1228.671764][ C1] net_ratelimit: 18 callbacks suppressed [ 1228.671775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1228.683347][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:34:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9f99290d3705176354650174405f3d28e2eb010018000000000062cab7557e99f07b3c8d2c39ac5a1ae53beed0d7d23074aeb3d4090a2ab54a9d285d77a9b78c3357c1e11c2c099016a1f99f056aa63cebefb4ecc094e5d92e267aa5535d842ffa9dfee84d308c7d82dc44fc4036487863c31bd933ab934f74b93326b9e5510fd89525d0ef40320330924940bf92365b4cc5820817"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x5000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8002, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x10e, 0x9}) [ 1228.797281][T19710] BPF:hdr_len not found [ 1228.830387][T19711] BPF:No type found 01:34:56 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28757, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:56 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x500000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:56 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000035b00"}) [ 1228.953979][T19818] BPF:btf_header not found [ 1229.013213][T19818] BPF:btf_header not found 01:34:56 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x60ffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1229.191705][T19935] BPF:hdr_len not found 01:34:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000280)=0xe8) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000109142, 0x14d) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x13, 0x1, 0x3ff, 0xfffffffd, 0xc0, r1, 0x95, [], r3, r4, 0x4, 0x4}, 0x3c) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) ioctl$EVIOCREVOKE(r7, 0x40044591, &(0x7f0000000300)=0x6) sendmsg$TIPC_CMD_GET_NETID(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x800) ioctl$KVM_RUN(r6, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 1229.231789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1229.237738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1229.241773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1229.249226][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1229.257125][T19854] loop3: p1 p2 p3 p4 01:34:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x80000000, 0x219b57cda2df2a57, 0x4, 0x80000000, 0x1b5, {0x77359400}, {0x4, 0x3, 0x7, 0x8, 0x7f, 0x7f, "f43f08bb"}, 0x80, 0x3, @userptr=0x2, 0x1db3, 0x0, 0xffffffffffffffff}) accept4$bt_l2cap(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xe, 0x800) prlimit64(r0, 0x7, &(0x7f0000000080)={0x3, 0x8}, &(0x7f00000000c0)) [ 1229.311758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1229.317596][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1229.321846][T19854] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1229.342733][T20043] BPF:No type found [ 1229.347766][T19854] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1229.385619][T19854] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:57 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x600000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1229.443519][T20048] BPF:No type found [ 1229.464108][T20048] BPF:No type found 01:34:57 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000ff00"}) 01:34:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x485c, r2, 0x3c2b5000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000580)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) read$alg(r0, &(0x7f0000000000)=""/49, 0x31) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 1229.631790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1229.633671][T20058] BPF:hdr_len not found [ 1229.637634][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:34:57 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28758, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1229.875091][T20107] BPF:No type found 01:34:57 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x700000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:57 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000ffffffff00"}) [ 1229.982024][T20173] loop3: p1 p2 p3 p4 01:34:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x7, 0xc9bb5c4d2fc2ba79) write$P9_RGETATTR(r1, &(0x7f0000000b40)={0xa0, 0x19, 0x0, {0x400, {0x1, 0x4}, 0x10, 0x0, 0x0, 0x4a, 0x0, 0x24b0839a, 0x7, 0x1, 0x7f, 0x5, 0x8, 0x6, 0x6, 0x401, 0xe2, 0x8, 0xffffffff, 0x6}}, 0xa0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="00009091233367a015e2794c3e516bb56e49000000f8d18a6f60272e7f2b7ff73629cdb578bcd31438d645bcd60120d9af9e45d2fa2e248ea94a23b272d4bc4cc02527e151bbb284ca0c397f4d39b59d3b4a41a807306a1192d6f273f041ee34a6967989b759e980a26c16675fed11ebcb2283d6c979fff94a7fcbf8b3290b2c96411de434775c76aad518607646c47803657e2ea506be0c48c8fa6d76d58382262fcfc0c4aebf2b294235824137173dfa8de0630744bc6b04226e8fae93ec555ec0b5009910641962bd74d8a21b7ea04cb2c4"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x8802) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x9d, 0x101000) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x10800, &(0x7f0000000540)={'tgvns=rlma\x03', {'port', 0x3d, 0x4e24}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x27}}]}}) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8eb08ed1b97c454b}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x26044005) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) getrandom(&(0x7f0000000200)=""/21, 0x15, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x30, 0x5f, 0x2e, 0x61, 0x5f, 0x30]}}, &(0x7f0000000380)=""/249, 0x20, 0xf9, 0x8}, 0x20) [ 1230.017519][T20173] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1230.046116][T20173] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1230.077755][T20281] BPF:hdr_len not found [ 1230.114234][T20173] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000200"}) 01:34:58 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1230.413315][T20357] 9pnet_virtio: no channels available for device 127.0.0.1 01:34:58 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x1000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1230.525817][T20599] BPF:hdr_len not found 01:34:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28759, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x76, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x1]}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r7, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r7, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000180)={r7, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e22, @multicast1}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000480)={r8, 0x38, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x283, @empty, 0x80}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0xfff}]}, &(0x7f00000004c0)=0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r9 = semget$private(0x0, 0x4, 0x0) semctl$SETVAL(r9, 0x0, 0x10, 0x0) semctl$SEM_INFO(r9, 0x2, 0x13, &(0x7f0000000380)=""/254) [ 1230.683489][T20705] BPF:No type found 01:34:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000300"}) 01:34:58 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x7e00000000000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:58 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1230.983734][T20717] loop3: p1 p2 p3 p4 [ 1230.993282][T20717] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1231.001212][T20717] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1231.010155][T20717] loop3: p4 size 32768 extends beyond EOD, truncated [ 1231.146751][T20730] BPF:hdr_len not found 01:34:59 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875a, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:34:59 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000400"}) 01:34:59 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xe0ffffffffffffff, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) fchdir(r3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1231.464538][T20749] BPF:hdr_len not found [ 1231.489296][T20749] BPF:hdr_len not found [ 1231.511084][T20740] loop3: p1 p2 p3 p4 [ 1231.515905][T20740] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1231.532369][T20740] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1231.573747][T20740] loop3: p4 size 32768 extends beyond EOD, truncated 01:34:59 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000500"}) 01:34:59 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x100000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:59 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfeffffff00000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:34:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1232.079964][T20970] BPF:No type found 01:34:59 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000600"}) 01:34:59 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1232.180904][T20975] BPF:hdr_len not found [ 1232.207489][T20975] BPF:hdr_len not found 01:35:00 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff00000000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1232.532601][T21091] loop3: p1 p2 p3 p4 [ 1232.552091][T21091] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1232.593310][T21097] BPF:hdr_len not found [ 1232.604405][T21097] BPF:hdr_len not found [ 1232.642606][T21091] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1232.684043][T21091] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000040)={0x4, "a02e0c17686d6d824cd2e02df28b4018b75bab1cf427c65000796021eda46def", 0x579f2e8c6e7af646, 0x1}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x1ff, 0xf1ad, 0x4, 0xff81}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000047160ba84c0621629171dc9156bc0000ea0000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1209b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x8, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x200, 0x40000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000080)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\a\x00'}) 01:35:01 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffff600000, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:01 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875c, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:01 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x200000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1233.625807][T21336] BPF:hdr_len not found [ 1233.632839][T21339] BPF:No type found [ 1233.638986][T21336] BPF:hdr_len not found 01:35:01 executing program 2: clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000001000000000000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x8, 0x1, 0x5, 0x7, 0x2, 0xfffffffffffff000, 0x6, 0x6}, &(0x7f0000000040)={0x6, 0xab7, 0x2128, 0x80, 0x28, 0x10000, 0x1fa2}, &(0x7f0000000080)={0x3ff, 0x9f, 0x0, 0x7, 0x1, 0x400, 0x8000, 0x9f0}, &(0x7f00000000c0)={r0, r1+10000000}, &(0x7f0000000140)={&(0x7f0000000100)={0x1}, 0x8}) 01:35:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\b\x00'}) [ 1233.716410][T21345] loop3: p1 p2 p3 p4 [ 1233.741754][T30021] tipc: TX() has been purged, node left! [ 1233.768225][T21345] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:01 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffe0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1233.791845][ C0] net_ratelimit: 22 callbacks suppressed [ 1233.791873][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1233.803326][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1233.895127][T21345] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\t\x00'}) [ 1233.956567][T21345] loop3: p4 size 32768 extends beyond EOD, truncated [ 1234.005718][T21456] BPF:hdr_len not found 01:35:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$dupfd(r1, 0x406, r0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1234.031761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1234.037583][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1234.053955][T21456] BPF:hdr_len not found 01:35:02 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:02 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875d, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:02 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000001900"}) [ 1234.412960][T21576] BPF:hdr_len not found 01:35:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) [ 1234.605617][T21649] loop3: p1 p2 p3 p4 [ 1234.632451][T21649] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:02 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x300000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1234.674593][T21649] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1234.775756][T21649] loop3: p4 size 32768 extends beyond EOD, truncated [ 1234.865650][T21694] BPF:No type found 01:35:02 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000300"}) [ 1234.911764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1234.917609][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:02 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000440)="66b9930200000f32baf80c66b89256478666efbafc0cecbaf80c66b8114c818466efbafc0cb012ee65f0804100060f30baf80c66b894695c8c66efbafc0cb036eebaf80c66b85aba378666efbafc0cb007ee3e0f011c0f0966b86c0000000f23c00f21f86635010001000f23f8", 0x6d}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x65, &(0x7f00000004c0)=""/200, &(0x7f00000003c0)=0xc8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) move_pages(r1, 0x3, &(0x7f0000000080)=[&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000036000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000140)=[0x8, 0x5, 0x1, 0x100, 0x0, 0x7f, 0x1dc, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8000], 0x0, 0x280}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r4 = accept$inet6(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) fremovexattr(r4, &(0x7f0000000280)=@random={'os2.', 'posix_acl_access}\x00'}) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f00000001c0)) fadvise64(r3, 0x5, 0x100000000, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1235.471760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.471766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.471795][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.477558][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.602216][T30021] device bridge_slave_1 left promiscuous mode [ 1235.611862][T30021] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.682328][T30021] device bridge_slave_0 left promiscuous mode [ 1235.688707][T30021] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.241992][T30021] device hsr_slave_0 left promiscuous mode [ 1237.281839][T30021] device hsr_slave_1 left promiscuous mode [ 1237.352518][T30021] team0 (unregistering): Port device team_slave_1 removed [ 1237.372598][T30021] team0 (unregistering): Port device team_slave_0 removed [ 1237.384008][T30021] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1237.435959][T30021] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1237.535638][T30021] bond0 (unregistering): Released all slaves [ 1238.025998][T21987] IPVS: ftp: loaded support on port[0] = 21 [ 1238.194139][T21987] chnl_net:caif_netlink_parms(): no params data found [ 1238.224165][T21987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.231387][T21987] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.239181][T21987] device bridge_slave_0 entered promiscuous mode [ 1238.246885][T21987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.254383][T21987] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.265316][T21987] device bridge_slave_1 entered promiscuous mode [ 1238.287640][T21987] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1238.298530][T21987] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1238.321007][T21987] team0: Port device team_slave_0 added [ 1238.327933][T21987] team0: Port device team_slave_1 added [ 1238.403949][T21987] device hsr_slave_0 entered promiscuous mode [ 1238.455302][T21987] device hsr_slave_1 entered promiscuous mode [ 1238.494861][T21987] debugfs: Directory 'hsr0' with parent '/' already present! [ 1238.522039][T21987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.529193][T21987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.541633][T21987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.548759][T21987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.660594][T21987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1238.683560][T27225] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.699622][T27225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.721552][T21987] 8021q: adding VLAN 0 to HW filter on device team0 [ 1238.729450][T27225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1238.740846][T27225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1238.760714][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1238.769690][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1238.784826][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.792016][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.800471][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1238.809121][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1238.818160][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.825228][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.833573][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1238.844007][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1238.874752][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1238.894647][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1238.915151][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1238.928804][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1238.940422][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1238.950092][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1238.963776][T21987] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1238.993041][T21987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1239.003398][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1239.022800][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1239.037719][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1239.061140][T27225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1239.069071][T27225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1239.076546][ C1] net_ratelimit: 14 callbacks suppressed [ 1239.076577][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.076602][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.099817][T21987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1239.111777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.117975][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.231822][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.237639][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000005b0300"}) 01:35:07 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875e, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:07 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r3 = open(&(0x7f0000000280)='./bus\x00', 0x84d00, 0x80) fchmodat(r3, &(0x7f0000000440)='./bus\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x1ff, 0x0, 0x0, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000380)={0x854, 0x0, [], {0x0, @bt={0x1f, 0x3ff, 0x1, 0x2, 0x7, 0x6, 0x2, 0x401, 0x0, 0xffff, 0x8, 0x4, 0x856, 0x1, 0x17, 0x0, {0x80000000, 0x7}, 0x7, 0xe7}}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000480)=0x7) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000070000003d783cd712a93d679cf96ea21682692d000000008001"]) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x1, &(0x7f00000004c0)=0x1, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:35:07 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x400000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1239.295107][T22034] BPF:Invalid section offset [ 1239.310605][T22034] BPF:Invalid section offset 01:35:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0xfd43, 0xf9, 0x8}, 0x20) [ 1239.351756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.357563][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1239.400946][T22048] BPF:hdr_len not found [ 1239.406534][T22045] BPF:No type found [ 1239.426482][ T27] audit: type=1804 audit(1577237707.210:2339): pid=22047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir118002946/syzkaller.z5HQU3/1266/bus" dev="sda1" ino=16656 res=1 [ 1239.471782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1239.477634][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000500"}) [ 1239.522329][T22046] loop3: p1 p2 p3 p4 [ 1239.529180][T22046] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1239.537942][ T27] audit: type=1804 audit(1577237707.280:2340): pid=22047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir118002946/syzkaller.z5HQU3/1266/bus" dev="sda1" ino=16656 res=1 01:35:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000080)=0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x6000, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) [ 1239.596304][T22046] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1239.613732][T22046] loop3: p4 size 32768 extends beyond EOD, truncated [ 1239.656810][ T27] audit: type=1804 audit(1577237707.410:2341): pid=22059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir118002946/syzkaller.z5HQU3/1266/bus" dev="sda1" ino=16656 res=1 01:35:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000600"}) [ 1239.808432][ T27] audit: type=1804 audit(1577237707.430:2342): pid=22047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir118002946/syzkaller.z5HQU3/1266/bus" dev="sda1" ino=16656 res=1 01:35:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x4, 0x1, 0x100000, 0x2000, &(0x7f0000035000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x14, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0, 0x3}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:07 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2875f, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1239.946721][T22076] BPF:No type found [ 1240.032503][T22077] BPF:No type found 01:35:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\a\x00'}) [ 1240.235090][T22095] loop3: p1 p2 p3 p4 [ 1240.250846][T22095] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:08 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\t\x00'}) [ 1240.283832][T22095] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1240.292423][T22095] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x100000, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000002c0)=0x6b) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000340), 0x4) dup2(r2, r3) r6 = fcntl$dupfd(r3, 0x406, r1) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xa, &(0x7f00000001c0)={&(0x7f0000000140)=@getaddr={0x0, 0x16, 0x200, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0xf}, 0x1, 0x0, 0x0, 0xa004814}, 0x4000) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r7, 0x40106410, &(0x7f00000000c0)={0x2a, &(0x7f0000000080)="f8749694f9879fcaa444fa948430a835dbd291542082406c926aa5ef7476f5496dd10b8eb6d89fe2c59f"}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000000)="5cd6fc3b171e8f95bd3fab8227e53de7d3be5df7eae809") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0x2f2, 0x8}, 0x20) 01:35:08 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:08 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28760, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:08 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x500000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1240.617147][T22315] BPF:hdr_len not found [ 1240.646574][T22318] BPF:No type found [ 1240.688624][T22306] BPF:No type found 01:35:08 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000001900"}) 01:35:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r4 = fcntl$dupfd(r3, 0x80c, r0) socket$unix(0x1, 0x5, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000080)={0x9, 0xffffff6d, 0x3, 0x3, 0x13, "4f46ece671e25056240909821f7112b6a07039"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)={0x2, 0x5, 0x40, 0x9, 0x59, 0x0, 0x70bd26, 0x25dfdbfd, [@sadb_key={0x1a, 0x9, 0x640, 0x0, "afbf7b11145d2d1773209adc2cfcee741b49ab056f51b8563d26a7accc0c857688094eca3a237334764c66a87bc687efe4cd9d8c8d77c2c8ea15bdf1e7c49f2449be6ac20ba714c9e6a197a1e2f3877c0d8bdbb7aafd38aeb40d3d33757ed6244289a7faff84a612dabdd8607ce8769f28749a116199adba24537b6887b2b66c01f63065894523dc9d9c008c3b890c352fa283fdb77544c76455aefcedd925f9bf6c360b9f3ddb3f681eb2161bb23bb5b3f46cc6884bcd4de066d59f82b62a1eaee14d796fcb6d55"}, @sadb_sa={0x2, 0x1, 0x4d3, 0xc, 0x7b, 0x6c, 0x0, 0x1}, @sadb_key={0x11, 0x8, 0x3d0, 0x0, "6d83fe8ef7d417da4607d60849a763a1df80dbdf7203a083e0f8ea48781cd178fca4edef1ecfff3e419ba5ca452d5037d8335c2e9cd0942cd82e6a6967e9198bfc5b97870daf9ffcba8fe947936cc51eb32a4540c25bca6a16e91fb1f65319fe2e8e2850f96931ee2a84883f2785aeccae3d83532e515e2acdde"}, @sadb_x_policy={0x8, 0x12, 0x3, 0x4, 0x0, 0x6e6bba, 0x3e3, {0x6, 0x2b, 0x84, 0x1, 0x0, 0x7ff, 0x0, @in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x15}}}, @sadb_x_sec_ctx={0x13, 0x18, 0xfb, 0x9, 0x89, "726f2a8e30862ff26f803ad8dadddc895f770ca34d5cd2f6f157b2ff45838d769042ecd72076609b6d8f3d51d1e2f2fc4d88a47dee718955237f18f072a7776caec37353814bf7b7e27a38b3efcf35cc5b0a8ed65a19612a8cf4bc7a2cf8bac6e88a5effe31557235031a7478a0b4ecc6a8ee34cfc9f2d20d011032d08e04f6b088afe1304b1e5a9aa"}, @sadb_x_nat_t_type={0x1, 0x14, 0x90}, @sadb_address={0x3, 0x7, 0x2b, 0x0, 0x0, @in={0x2, 0x4e22, @rand_addr=0x80}}, @sadb_x_sec_ctx={0xb, 0x18, 0x2, 0xa7, 0x4a, "08cab65bacf40802fee607818dd144c4399b3ce993ff1a1924e726071787f8de9344ac0487e490565967f2eb453213d220e7c03f24d557dbae957a07c6f8ab07a9f525d1e303e638eaed"}]}, 0x2c8}}, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1240.767077][T22323] loop3: p1 p2 p3 p4 [ 1240.783600][T22323] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1240.847760][T22323] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:08 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x600000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1240.898471][T22323] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:08 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00?\x00'}) 01:35:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000000000000000000000a000000006192613e512e610000de2e1e5a145181e6c26c83356854a9648d5be78e01706589c656de928fb44f46c52dcee44f1072c9c461a30a8e9b3cdc2f13d9fb6312a60c430c66ddcbd89270bdfdf609bd1d34647f81d39f4e3e23671e2d6bfca03fa4f342ee23a6f3eb3268787aa40acefae2b0bd7b73803d58"], &(0x7f0000000380)=""/249, 0x22, 0xf9, 0x1}, 0x20) 01:35:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000080)="0f00da0fc719663e6466450f3880b0e9000000450fc731410f5cb900000000460f001666b8b6008ee86664410f3066b850008ed066430f3881bd00800000", 0x3e}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x9, 0x10800) write$snddsp(r0, &(0x7f0000000040)="95c0af51fc7e28b4a4e554dac53dae019ccdd10a0cb404391264704f2264c1fdfd17e6fe5a52dc504d92e7bddeab27397626ca1e4796286cb486fd6ca508d9b8c3ef5e4d9184804fcadd5e0568405049ab801c4b4338d11f2d740ccee649f9858ead918ab2aa1a35951f2de14265698e98b6546d18c947d829259cbd3423241225f29896f232c0f6fb9c4b61b3a8f91b836b097d826c6baf544cb095c4d33c533ca8aa35df72f6df1d5557a2913bc2adc878c2dac17b12d8eba72e43104094e9de20becf3aa9966f244c192f75dd2a8f779160cde3433ed25a9e", 0xda) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[], &(0x7f00000001c0)=""/259, 0x0, 0x103, 0x8}, 0x20) 01:35:09 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28761, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:09 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00@\x00'}) [ 1241.471014][T22588] BPF:hdr_len not found [ 1241.522674][T22599] loop3: p1 p2 p3 p4 [ 1241.527558][T22599] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:09 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:09 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x700000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x3}}, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}, @typedef={0xc, 0x0, 0x0, 0x8, 0x5}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}, @restrict={0xf, 0x0, 0x0, 0xb, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x38, 0x0, 0x18}, @enum={0xc, 0x7, 0x0, 0x6, 0x4, [{0xc, 0x5}, {0x5, 0x2}, {0x7, 0x1}, {0xd, 0x1}, {0xb, 0x200}, {0xf, 0x89}, {0x5, 0x80000001}]}]}}, &(0x7f0000000380)=""/249, 0xbe, 0xf9, 0x8}, 0x20) [ 1241.642502][T22599] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1241.650219][T22599] loop3: p4 size 32768 extends beyond EOD, truncated [ 1241.662642][T22683] BPF:hdr_len not found [ 1241.734255][T22688] BPF:No type found 01:35:09 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000035b00"}) [ 1241.816616][T22692] BPF:[3] Invalid name_offset:12 01:35:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x800) [ 1241.840733][T22696] BPF:[3] Invalid name_offset:12 01:35:09 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28762, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = getpid() r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000000)) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) wait4(r1, &(0x7f0000000100), 0x40000000, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:09 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000ff00"}) [ 1242.132861][T22710] loop3: p1 p2 p3 p4 [ 1242.147228][T22716] BPF:No type found [ 1242.147733][T22710] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1242.182484][T22710] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x110000, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000180)={0xffffffde, 0x8, 0x2b0, 0x2, 0x11, "730ce42a9c369b6a3bafe51f750c7192af6661"}) setsockopt$inet6_int(r3, 0x29, 0xbd, &(0x7f0000000140)=0x7, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xffff, 0x109080) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000480)="e18115a5c11e39bc026b2450fef12201e0a673d2738e91099efc8036008859be2c9ee6f86150cfe70d65afff4a5a5063559a6473a5522c5c25af0d2024155efec71436ce44349ac77eadcb43e29f7c83458c2caf554b78c9f4743b80203bb931aa3b5de97085b2ec0d410a8b60625e81cdd2d03790c7bca2d0b153fc9d5e4c0cba52510eb0adf5143f75dea051125872211a5b5665cbec", 0x97) [ 1242.246205][T22710] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:10 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28763, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000006c0200000202000000000000000000000a040000000600000000000000000200000000005f00"/65], &(0x7f0000000380)=""/249, 0xfffffe34, 0x63, 0x8}, 0x20) 01:35:10 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x6, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000200"}) [ 1242.782278][T22938] loop3: p1 p2 p3 p4 01:35:10 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e00000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:10 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1000006, 0x1012, r0, 0x9b142000) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(r1, 0x5450) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0xfffffc00) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) getegid() [ 1242.861889][T22938] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}) [ 1242.913325][T22938] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1242.942723][T22938] loop3: p4 size 32768 extends beyond EOD, truncated [ 1242.957766][T22952] BPF:hdr_len not found [ 1242.969437][T22960] BPF:No type found [ 1243.086941][T22962] BPF:No type found 01:35:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x18800, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) [ 1243.117768][T23068] BPF:No type found 01:35:10 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28764, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:11 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video2\x00', 0x2, 0x0) fsync(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = getpid() r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r7) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000440)={0xa00000, 0xe779, 0x7, r7, 0x0, &(0x7f0000000400)={0x9a090f, 0x20, [], @value=0x3}}) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) getpgid(r4) r8 = syz_open_procfs(r4, &(0x7f0000000080)='auxv\x00') r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r9, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r10, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r10, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r8, 0x84, 0x6, &(0x7f0000000140)={r10, @in6={{0xa, 0x4e22, 0x0, @rand_addr="3595284fd473499465de20564b57712b", 0x7f}}}, &(0x7f0000000280)=0x84) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:35:11 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000200"}) [ 1243.296643][T23077] BPF:No type found 01:35:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000330000000013605b58b3dda91921000000b38a5c05f3181477f49000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1243.500318][T23094] BPF:hdr_len not found [ 1243.532516][T23086] loop3: p1 p2 p3 p4 [ 1243.541578][T23086] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1243.559505][T23086] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1243.579985][T23086] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800"/26], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1243.698168][T23100] BPF:Invalid section offset [ 1243.712230][T23102] BPF:Invalid section offset 01:35:11 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000300"}) 01:35:11 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28765, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1243.885048][T23211] BPF:Unsupported section found [ 1243.926019][T23212] BPF:Unsupported section found 01:35:11 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfeffffff00000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:11 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x800) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000180), 0x7a75d17f0ce07119) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffff0f, 0x0, 0x2, [@func={0xffffff00, 0x0, 0x0, 0xc, 0x5}, @restrict={0x3, 0x0, 0x0, 0xb, 0x2}, @const={0x10, 0x0, 0x0, 0xa, 0x3}, @const={0x7, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x3, 0x5}, {0x8, 0x3}, {0x3, 0x5}, {0xa, 0x1}, {0xf, 0x4}]}, @fwd={0xf}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x56, 0x0, 0x6a}, @var={0xe, 0x0, 0x0, 0xe, 0x1}, @fwd={0xc}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000000)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:11 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000400"}) [ 1244.138412][T23228] BPF:Total section length too long [ 1244.164711][T23232] BPF:Total section length too long [ 1244.178401][T23234] BPF:No type found [ 1244.191856][ C0] net_ratelimit: 30 callbacks suppressed [ 1244.191867][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1244.203401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1244.210791][T23222] loop3: p1 p2 p3 p4 01:35:12 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f0000000240)=""/220, 0x452}, {&(0x7f0000000480)=""/65, 0x41}], 0x3, &(0x7f00000001c0)=""/42, 0x2a}, 0x4002) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1244.215449][T23222] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1244.233820][T23222] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1244.302648][T23222] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:12 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffff00000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1244.472382][T23445] BPF:No type found [ 1244.496960][T23448] BPF:No type found 01:35:12 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) accept4$ax25(r0, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @netrom, @null, @default, @bcast, @default, @remote, @default]}, &(0x7f0000000080)=0x48, 0x800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000000000fd55b178f88b1dab4bfba4368a5119637b606937cf28be2834a979adc56f62b0f7f71965c050ada6da6a4ad46071a5ce06e94190403992da71b99f041a1d21bbb584ac48f695128db681a9057868e828935042a850460d28903cfc541f84a60e"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:12 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000500"}) [ 1244.636873][T23455] BPF:No type found 01:35:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000000380)={0x0, @pix_mp={0x6, 0x0, 0x30323953, 0x0, 0xe, [{0x7, 0x3}, {0x4, 0x3d}, {0x14d4000, 0x100}, {0x401}, {0xffffffff, 0x6}, {0xdd7, 0x7fff}, {0x7fff, 0x7fffffff}, {0x4000, 0x30}], 0x8, 0x2, 0x0, 0x1, 0x5}}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) accept$packet(r5, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) sendmsg$nl_route_sched(r4, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20302425}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@newtfilter={0x54, 0x2c, 0x200, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x7, 0xfff3}, {0xfff2, 0x18}, {0xc, 0xb}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x1c, 0x2, [@TCA_FLOW_DIVISOR={0x8, 0x8, 0x7}, @TCA_FLOW_PERTURB={0x8, 0xc, 0x800}, @TCA_FLOW_RSHIFT={0x8, 0x4, 0x8001}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x2004c044) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000080), &(0x7f0000000140)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}) ioctl$KVM_RUN(r8, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 01:35:12 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28766, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1244.770182][T23468] BPF:hdr_len not found [ 1244.783191][T23459] BPF:No type found 01:35:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x400, 0x70bd25, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 1244.972812][T23477] loop3: p1 p2 p3 p4 [ 1244.978169][T23477] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1244.997566][T23477] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1245.015953][T23477] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:12 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000600"}) 01:35:12 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28767, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1245.187017][T23487] BPF:No type found [ 1245.212605][T23489] BPF:No type found 01:35:13 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001f40)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000001f80)={@mcast2, @empty, @remote, 0x17410569, 0x3, 0x43ff, 0x400, 0x3ff, 0x10, r1}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1245.311788][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.317690][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:13 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\a\x00'}) 01:35:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000000c0)=0xffffffe0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9708000000c8b80dc1d83600ae9808652a3dea7ceb80983b50a2a03d1f04531dc2a34b44674b324acc2157e80dd7153e59f9a08e4b53bf64f675f6fca6d53d3cc335836ce0f1b19900686be4703546e22e589a9c"], &(0x7f0000000380)=""/249, 0x54, 0xf9, 0x1}, 0x20) [ 1245.433441][T23504] BPF:No type found [ 1245.453069][T23525] BPF:No type found [ 1245.473062][T23503] loop3: p1 p2 p3 p4 [ 1245.478006][T23503] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:13 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffffff600000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1245.521987][T23503] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1245.574685][T23503] loop3: p4 size 32768 extends beyond EOD, truncated [ 1245.703987][T23690] BPF:No type found [ 1245.711769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.717619][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:13 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xe0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018008000000700000000000000021b5bf00c33cc6800000002400000672d"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = socket$rds(0x15, 0x5, 0x0) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000000)=@sco, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/161, 0xa1}, {&(0x7f0000000240)=""/175, 0xaf}, {&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000300)=""/72, 0x48}], 0x4, &(0x7f0000000480)=""/180, 0xb4}, 0x20002100) 01:35:13 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00'}) 01:35:13 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28768, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1245.871790][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.871808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.877611][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1245.951758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.966122][T23734] BPF:btf_header not found [ 1245.988819][T23736] BPF:btf_header not found 01:35:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x6, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x308}, 0x0, 0x2, 0xffffffffffffffff, 0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f0000000540)={0x0, 0x0, 0x20}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r8, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000300)={r8, 0x17}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r8}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000440)={r8}) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200000, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000180)={0x10000, &(0x7f0000000080), 0x0, r9, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x5, 0x3, 0x2, 0x9, 0x0, 0x7, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc6, 0x1, @perf_config_ext={0x0, 0x6}, 0x20640, 0x8, 0x7, 0x9, 0x2, 0xfffff801, 0x7}, 0x0, 0x6, r10, 0xbe4a792855fc40f) write$P9_RSYMLINK(r9, &(0x7f0000000280)={0x14, 0x11, 0x1, {0x4, 0x3, 0x5}}, 0x14) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1246.030443][T23742] BPF:hdr_len not found 01:35:13 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1246.122522][T23746] loop3: p1 p2 p3 p4 01:35:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigaction(0x40, &(0x7f0000000080)={&(0x7f0000000000)="450f18dbc4a17b2dcac42279216fa1c421175c01c4e20192440800c482090232c4c34d5d593505c442214702f0830ab84483585e99", {0xfffffffffffffffd}, 0x40000000, &(0x7f0000000040)="42720564f3426d66362e26f30f1eedc4c271cfabcff5bf5f266441decc3e3666440f2e2e8fe878c0d598c403397cc50666f2430fd0d6dfcb"}, &(0x7f00000001c0)={&(0x7f00000000c0)="c4017950e766f3a5c4227d321842ad2644d9e1c482fd23a63ca70702c4e169ec15001000008f295096fe0fd9c4c4012ddddd", {}, 0x0, &(0x7f0000000100)="c4636142c0ec664a0f6edf3ef3420f1efbc4c1045e6d94466baa0100000079c4a1fd51bedc15c815c4c1ee51a821c5c29ac42279989aea173dd0c421d9e56a5136f36f"}, 0x8, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1246.159340][T23757] BPF:No type found [ 1246.161961][T23746] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1246.185545][T23746] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1246.218465][T23746] loop3: p4 size 32768 extends beyond EOD, truncated [ 1246.333685][T23766] BPF:No type found 01:35:14 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000001900"}) 01:35:14 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28769, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000002400e50d000011000000000000000000", @ANYRES32=r5, @ANYBLOB="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"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@empty, @rand_addr="2d8f6853a31930d6c20a9f5758296542", @ipv4={[], [], @multicast2}, 0x101, 0x80, 0x2, 0x0, 0x3, 0x121, r5}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:35:14 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00?\x00'}) [ 1246.795309][T23887] loop3: p1 p2 p3 p4 [ 1246.828544][T23887] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1246.888855][T23887] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1247.006056][T23887] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:14 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x300, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:14 executing program 0: clone(0x4e240600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getpeername$tipc(r2, &(0x7f0000000480), &(0x7f00000004c0)=0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r4}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000500)='./bus\x00', 0xd27, 0x1, &(0x7f00000000c0)=[{&(0x7f00000007c0)="61dcddd424bba3f804a2c387448bd896e1a8d2ca726fa2f7d562023515f387038a84afa778c51f39a81bcdb140056e790a1618221aa877299b398fc74dd9317edb3661b4ef149bae8518bb50aa0dcfab9da1a877d50a39dbf7a0dfb65f2c846fb0428de11ae8e557eece04f2ee06a72bb3d52782289c12f6f63776fd6eece8c5c5389a5b157d0fc45e69bb9e977e10156dc493ed8a967b1ba8f650b5e156ae88d8cc218342630fc4f6df0ba5f74f033ee65d8de0c1c80a75b8faeb225f9a634a73c060e5c668e40de2ce2b51438d3f16fea2", 0xd2, 0xd8}], 0x4800, &(0x7f00000008c0)=ANY=[@ANYBLOB='fault_injection=0x0000000000000008,fault_injection=0x0000000000000003,dont_appraise,smackfsfloor=hfs\x00,fowner<', @ANYRESDEC=r1, @ANYBLOB="2c646f753569643ef47286bdb7106ce8a3168a5793f66c885f5579f3910bddf824ee67c0aa6605f5d0186420b92da3c48e00"/62, @ANYRESDEC=r3, @ANYBLOB=',smackfshat=nodev,appraise_type=imasig,uid<', @ANYRESDEC=0x0, @ANYBLOB=',uid>', @ANYRESDEC=r4, @ANYBLOB='c`']) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x80) 01:35:14 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00@\x00'}) 01:35:15 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2876a, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1247.223020][T24011] BPF:hdr_len not found 01:35:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='/dev/kvm\x00', 0x40, 0x4, &(0x7f0000000140)={0x4, 0x6, 0x10, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0xffffffffffffffc8, 0xf9, 0x1}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) r2 = getpgrp(0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r3}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r4, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r9) r10 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r11 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r11, &(0x7f0000000300)=ANY=[], 0x6) r12 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, r12) ioctl$EVIOCREVOKE(r11, 0x40044591, &(0x7f0000000300)=0x6) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r13, 0x0) r14 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r13, r14) r15 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r15, 0x4, 0x42000) r16 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r16, 0x0) r17 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r16, r17) ioctl$EVIOCREVOKE(r16, 0x40044591, &(0x7f0000000300)=0x6) r18 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r18, 0x0) r19 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r18, r19) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r20, 0x0) r21 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r20, r21) getsockopt$inet6_IPV6_IPSEC_POLICY(r20, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r22 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r22, 0x0) write$P9_RWALK(r22, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r22, 0x0) ioctl$EVIOCREVOKE(r22, 0x40044591, &(0x7f0000000300)=0x6) r23 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r23, 0x0) write$P9_RWALK(r23, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r23, 0x0) r24 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r23, r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) r26 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={0xff}, 0x8) r27 = fsmount(0xffffffffffffffff, 0x1, 0x70) r28 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r28, 0x0) write$P9_RWALK(r28, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r28, 0x0) ioctl$EVIOCREVOKE(r28, 0x40044591, &(0x7f0000000300)=0x6) r29 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r29, 0x0) r30 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r29, r30) ioctl$EVIOCREVOKE(r29, 0x40044591, &(0x7f0000000300)=0x6) r31 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r31, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r31, &(0x7f0000000300)=ANY=[], 0x0) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r33 = getuid() r34 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r34, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r35) getgroups(0x4, &(0x7f0000000280)=[0xee00, r35, 0x0, 0xffffffffffffffff]) r37 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r37, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r37, &(0x7f0000000300)=ANY=[], 0x0) r38 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r38, 0x0) write$P9_RWALK(r38, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r38, 0x0) r39 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r38, r39) r40 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r40, 0x0) r41 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r40, r41) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) r43 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001e00)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r44 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r44, 0x0) r45 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r44, r45) getsockopt$inet6_IPV6_IPSEC_POLICY(r44, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r46 = fanotify_init(0x1, 0x101000) r47 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r47, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r48 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r48, 0x0) r49 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r48, r49) ioctl$EVIOCREVOKE(r48, 0x40044591, &(0x7f0000000300)=0x6) r50 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/uinput\x00', 0x802, 0x0) r51 = getpid() sched_setscheduler(r51, 0x5, &(0x7f0000000380)) getpgid(r51) lstat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) r53 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r53, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r54) r55 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r55, &(0x7f0000000300)=ANY=[], 0x6) r56 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r55, r56) r57 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r57, 0x0) r58 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r57, r58) ioctl$EVIOCREVOKE(r57, 0x40044591, &(0x7f0000000300)=0x6) r59 = syz_open_dev$dmmidi(&(0x7f0000001f40)='/dev/dmmidi#\x00', 0x4ca0, 0x2) r60 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/vhost-vsock\x00', 0x2, 0x0) r61 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001fc0)='/proc/self/attr/current\x00', 0x2, 0x0) r62 = getpid() sched_setscheduler(r62, 0x5, &(0x7f0000000380)) getpgid(r62) r63 = getpgid(r62) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r64}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r65 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r65, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r66) getgroups(0x2, &(0x7f0000002000)=[0xffffffffffffffff, r66]) r68 = getpid() sched_setscheduler(r68, 0x5, &(0x7f0000000380)) getpgid(r68) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002040)=0x0) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r71 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r72 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r72, &(0x7f0000000300)=ANY=[], 0x6) r73 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r72, r73) ioctl$EVIOCREVOKE(r72, 0x40044591, &(0x7f0000000300)=0x6) sendmmsg$unix(r1, &(0x7f0000002340)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000001c0)="e82f6ee5f410e39398b4ed576607bb1370e5c54cf089d31b1bc68b4b4000b4a3bd30e6e61250e78d4b3bfd5a27e9a523339385c3e248d9cce41e577009695f4ee3707ffb56b5ce29fbc25a56477d29e0477a3d89c93e5cf04c56b214e147ae7906bf1841bd103cd84b33162ce2556ced4c9b40e23f4a8b23e4da213806161d6446d45558b0edd7c16cae60723c1fb112ff2733cdf16ef23f5d1f7c462c6bcdd26f94", 0xa2}], 0x1, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r5}}}, @rights={{0x28, 0x1, 0x1, [r6, r8, r0, r9, r0, r10]}}, @rights={{0x30, 0x1, 0x1, [r11, r14, r15, 0xffffffffffffffff, r0, r16, 0xffffffffffffffff, r19]}}, @rights={{0x24, 0x1, 0x1, [r20, r22, r24, r25, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r26, r27, r0, r0, r28, 0xffffffffffffffff, r29, 0xffffffffffffffff, r31, r32]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r33, r36}}}], 0xf8, 0x4}, {&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000580)="168a912730280fbccfd268f4462bc70f911078dc7e6c32bbe59abc47ac471066a761fce90b7470e182db197500ae60973e077edace27e25634e2ac01589f19556752c2ad95c381f46bc46bc4e168c7fa46438035c168fe635d71e279f5", 0x5d}, {&(0x7f0000000600)="608fce7229d8360af55fc9fe06637f785405087030b6c6227c0b0583448436324bc5d39aaf1c39e454fc7c50b67268b3dc0d52c4b1a7f2d3fe71b8251bbcac026cdcf55ccf8d2000007dceec45ec505f6bdbb217a81a61c3a9291f1882babca36f64e5dc729f78f8647df9c0578a40dc49dccc419715c0c58b5b9d6adf6e1d35a7c338b728095ee04b6256f92adb8d835811f9de35f9715eb17db6261ec9", 0x9e}], 0x2, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r37]}}, @rights={{0x24, 0x1, 0x1, [r39, r0, r41, r0, r42]}}], 0x48, 0x800}, {&(0x7f0000000780)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d40)=[{&(0x7f0000000800)="5dba56998b43ced49965b34bc89dd603b7b89620cce90253f9e15ebb35894e7fa0c48ff0c27b8d4c531027c4989c5a11f0d32f410670c239f450e23980160298edee229618cb0ba35a97fda6615bce71354daa68365862cfdc7733fb4347101d4eb287a952f847824baf22908c2ef8d64ba412f40e4d4b1bc9538589a3a57a32214843c113c412068f0743", 0x8b}, {&(0x7f00000008c0)="011a4dde12c2950f0dd0a50751331e580230adf6dcdbc53f3e2d186490f02a5e788f2bcec8521d9fe635bad25372d52b9dff0a30f629cdbe4151af10a7e9d40e715323c49d8ca312ad97d162933ee2009bbce63fe011f823d2a3b853e02f06753cbb7ea9b72c48c9ba6c26afa21ca1b0fff01bf3637193846126f00dbaa5f53d3d5f489579c90c9db5a45eae9f7912de4d9d06d6cea3756cf41c9c38b64060b4b035808ce50386841590836d2bfa26c9243d576acfb5457a1ed68a2c58fbeea88830b00563791c2a06fd5bf635b964e1ec9be15a9f7c1b026b15f5265bc6c49f3e3b52e3feee4cb4cde3fe8886451f", 0xef}, {&(0x7f00000009c0)="8302f06d5e3c1bcbeba6adabd3b959736d593bd49f318711ba7c443b03fb02fa0ff5fd924e144b24dc64b18d1eab8364b31206848b", 0x35}, {&(0x7f0000000a00)="1408154caf7e024e9e61cc7606e32f108db2762393fa0506b8410721922c836e2c5cb5c234e94f5024a45a8759a8a331ac1d94ff7df90740931f44", 0x3b}, {&(0x7f0000000a40)="15751f85657b2dfd3d08305f4cb3c5fce6eebe6a6a3540f7d8bd5e8e095acdc4647b411ebfdb6b78845f13d371850112c5de04f85c3b6c4c1287a66fca733225f1f6218cb69db4cb85da5719b3f3f5defd832b7f85a48d410eff2368c46c02", 0x5f}, {&(0x7f0000000ac0)="9640c5b2f96d34e6ea069feebceaffa0620e41fe563ae4a453777a6c651e5665f654e2904f121ede00e1d4c16ada0021f4264d1ee279bcb209b343f7dd2175101ccedf2ec1d55247618ff054a0aad5e1a8b822a696d16d3847ba5e34eab1e4279c0f60f5d52ec8d2163abb587dd2bf2feb3699a27ba7554df3b156dac352fef964133b1ac80e2c264ffb021be5a43212756fdd7db236049d2f3767ef9667794838fe51b357802a", 0xa7}, {&(0x7f0000000b80)="fb0aa3f98d2edab07690daa68c69d7f8b16a52ab31a0c111dc4061def6e3ed55b7d6190e15148ce80893eadccca824b15f1598aeaa964098373e3c0809f9c68681c39604c9aa4901bbbc13f08604840f46fcbdb04b2332ce9b26548d3229f386d958f06324e4b450e6baf036cc7c7b64", 0x70}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)="eeee581475ff15f2a5c78bf9468abd5bbe2ecb7409cfe239e956d1577e1fab4253f11b34841fdeb9d8572f990f80953e44700d8942e57fbb022825a7caa97d095928d5d12d0b2081490201284fc7f6d1cccf574ca82437c190f31ae07308bd63e89c56fdacac1eb75c25a174e386f920c41041ab311594d33f64702ac442a37c33940cda9e0f0a547720a336f9bb72e6ab141a8ff33d2797cf7a6a6ee7641cd6932c830e554849dc1c8f0d3268c055a95dff2b920522223adee5e8212ee87feea70a3eee2b7c1ca84d03aaaa27aa", 0xce}], 0xa, &(0x7f0000002140)=[@rights={{0x20, 0x1, 0x1, [r43, r44, r46, r0]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, r47, r48]}}, @rights={{0x20, 0x1, 0x1, [r50, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r51, r52, r54}}}, @rights={{0x34, 0x1, 0x1, [r56, r57, r0, r59, r0, r60, 0xffffffffffffffff, r61, r0]}}, @cred={{0x1c, 0x1, 0x2, {r63, r64, r67}}}, @cred={{0x1c, 0x1, 0x2, {r68, r69, r70}}}, @rights={{0x1c, 0x1, 0x1, [r71, r72, 0xffffffffffffffff]}}], 0x118, 0x4}, {&(0x7f0000002280)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002300), 0x0, 0x0, 0x0, 0x40}], 0x4, 0x40) 01:35:15 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000035b00"}) 01:35:15 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x2, 0x1}) [ 1247.490841][T24116] loop3: p1 p2 p3 p4 [ 1247.497428][T24116] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1247.549544][T24116] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1247.593378][T24116] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0198b58bac0f73128400000000000000009c3aad0af66757bfb4f40002c6"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x8000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r2, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r2, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x7, 0x2, 0x7, 0x1, 0x7}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r2, 0x43, 0x80, 0x2, 0xfffd, 0x3bb3, 0x9, 0x7f, {r5, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x7, 0x8001, 0x0, 0x8001, 0x20}}, &(0x7f0000000140)=0xb0) 01:35:15 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000ff00"}) [ 1247.831870][T24140] BPF:btf_header not found 01:35:15 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2876b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1247.872691][T24144] BPF:No type found 01:35:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0x7f, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1248.042621][T24153] loop3: p1 p2 p3 p4 [ 1248.047988][T24153] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1248.075829][T24140] BPF:btf_header not found [ 1248.104344][T24153] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1248.121289][T24153] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:15 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x500, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:15 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000200"}) 01:35:15 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000040)={0x1b7d, @dev={[], 0x16}}) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0xf537, 0x9, 0x8, 0x4f0, 0x0, r2}) 01:35:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000000)='/v/sd/pGmC#D#p\x00', 0x2, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1248.253651][T24372] BPF:No type found 01:35:16 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:35:16 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0xfffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1248.392403][T24405] BPF:hdr_len not found [ 1248.396915][T24392] BPF:No type found [ 1248.420658][T24442] BPF:No type found 01:35:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000100"}) 01:35:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x103000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000228bd7000fdf8df2501000000000000000c415500007031fc2d0c001473797a31"], 0x28}, 0x1, 0x0, 0x0, 0x4021010}, 0x10) 01:35:16 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x40080, &(0x7f0000000000)=ANY=[@ANYRES16=0x0]) 01:35:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x20, r6, 0x401, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xffffffffffffff21, 0x1, 0xffff}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0xd4, r6, 0x400, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb162}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7e63ab25}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x24}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcfbc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5fcb}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4008008}, 0x10050) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1248.755834][T24498] loop3: p1 p2 p3 p4 [ 1248.769721][T24498] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1248.825642][T24498] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1248.833834][T24507] BPF:No type found [ 1248.864622][T24510] BPF:No type found [ 1248.868882][T24498] loop3: p4 size 32768 extends beyond EOD, truncated 01:35:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000200"}) [ 1248.894662][T24507] BPF:No type found 01:35:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=""/248, 0x1a, 0xf8, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$TCXONC(r0, 0x540a, 0x8000) [ 1248.937062][T24510] BPF:No type found [ 1249.047610][T24529] BPF:btf_header not found [ 1249.242388][T24516] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 01:35:17 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x600, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:17 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x900000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:17 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000f20100000000000001002e6dc40123decc1a000700000000000061300000"], &(0x7f0000000480)=""/265, 0xffffffffffffffaf, 0x2f2, 0x8}, 0xfffffffffffffec2) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:17 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000300"}) [ 1249.471773][ C1] net_ratelimit: 15 callbacks suppressed [ 1249.471784][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.483449][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1249.503900][T24745] BPF:No type found 01:35:17 executing program 2: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000100)={0x5, 0xfc41, 0x240, 0x8, 0xb, 0x4}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb735d9d8c00007bc59f3a0000000002020000790d"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1249.572950][T24761] BPF:hdr_len not found [ 1249.593671][T24520] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1249.602385][T24756] loop3: p1 p2 p3 p4 [ 1249.617047][T24756] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1249.652247][T24756] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:17 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000400"}) [ 1249.693372][T24756] loop3: p4 size 32768 extends beyond EOD, truncated [ 1249.871756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.877741][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x1ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1249.944180][T24772] BPF:btf_header not found 01:35:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000004e00000000000000000063"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1249.977177][T24775] BPF:btf_header not found 01:35:17 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:17 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000500"}) [ 1250.031804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.031880][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.037593][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.043362][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.111758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.117577][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.238359][T24789] BPF:Total section length too long [ 1250.258187][T24790] BPF:Total section length too long 01:35:18 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000600"}) [ 1250.327346][T24792] loop3: p1 p2 p3 p4 [ 1250.338994][T24792] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1250.404967][T24792] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:18 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x700, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffffffff21, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0x0, 0x7, {0x10001, 0x4, 0xffffffff, 0x9}}, 0x20) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000000c0)={0xae, 0x1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x4000000, 0x6, 0x3}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0xd, 0x1fd, &(0x7f0000000480)}) 01:35:18 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000002c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) sendto$llc(0xffffffffffffffff, &(0x7f0000000040)="3eb6910b9393dc95ed2c9f76d330c9e99209f580c638e6a9877edf8004fbd0244524db751ada18a4a9e0988804a688bcdfd17da4d40468524567d4cb5af5585bcf302734680474c53c5d25bf3dd602ed9f3b7a4791fab51f00bb956007c16b44346f6bca68a96cee670a69bc7ba61ee1ce6a3119157bb55c6598399a6fd02e71c35f0b12095483108f4d7e2eeb8a59568bf61c2187e9a560103473c4b3f3439533654049b91c4c1b8d5163e34e5f6be094a1ee88b21362b4a84a9a66455c14d5f993a4ad66cf4e262400ebe051d6acce81fa4c413a9261ca8a8d65b409edf511d5d4b099ffb84cff", 0xe8, 0x80, &(0x7f0000000140)={0x1a, 0x282, 0x2, 0x2, 0x10, 0x3, @link_local}, 0x10) 01:35:18 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:35:18 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1250.735401][T25012] BPF:Invalid section offset [ 1250.823616][T25019] BPF:hdr_len not found [ 1250.883049][T25012] BPF:Invalid section offset 01:35:18 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1251.082394][T25131] loop3: p1 p2 p3 p4 [ 1251.087322][T25131] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:18 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80000, 0x0) write$capi20(r0, &(0x7f0000000080)={0x10, 0x1f, 0x86, 0x82, 0xe3}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x200000, 0x0) sendto$unix(r2, &(0x7f0000000740)="6b123ad196b39df459be6553694f54326e978694b4903128e7a6e2811d0227c24a27df6ff173f56875f74fe9936081c893537de62e06a4d6df077003bce9a21487986f21be99e53aa30977d22d36db984477cb1ecf0e9adec195a7436f48d98053230694f815744213cd54ce2775e95c2ad99a0a2ee9496f75f2f555a11b7f0e3356e08bd29163ed9855755b8eb14189306c3b75e357c6f7da039256cd4d033dd3a75165b1e3b8512096e3ba3d7577ab9fbb8d0379", 0xb5, 0x4000000, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r6, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r6, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r6, 0x45, "8fe3fc8be00909b25c0f2f73799a4390a2a66afdbca43ead2373097e5f3ced57bd02cb478d6d27f2e06ab3f366f4d952db7d86851309c17dcd3e953145d1a0146be753b41e"}, &(0x7f0000000800)=0x4d) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000880)={r7, 0x2c, &(0x7f0000000840)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x2634328a, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}]}, &(0x7f00000008c0)=0x10) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xa000, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) writev(r9, &(0x7f0000000980)=[{&(0x7f0000000900)="3a50bc27819437be15c6bac83170c69fe36f45f0d8cd172faf0c82f5f456c1506c5896727eb5785d4dcf59a32957d5f7d5b4b718c13c7f502739491c98051fd2326e3c0591f8ac", 0x47}], 0x1) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r8, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x2bc, r10, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @mcast2, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x20}, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1000, @local, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x851}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf07}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ef}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf5a0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}]}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x8080}, 0x40) dup2(0xffffffffffffffff, r4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], &(0x7f0000000380)=""/233, 0xfffffdff, 0x251, 0x8}, 0xffffff02) 01:35:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x212281) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000140)={0x1, 0x6, 0x81}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb8100180000000000000000000000f111c70809d511d7e500ebff00"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0xb8c}, 0x0, 0x0, r0, 0x0) dup2(r0, r4) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) fcntl$setstatus(r0, 0x4, 0x2000) [ 1251.210288][T25131] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:19 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1251.290412][T25247] BPF:Unsupported version [ 1251.386556][T25247] BPF:Unsupported version 01:35:19 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000003c0)={r4, @in={{0x2, 0x4e23, @loopback}}}, &(0x7f0000000480)=0x84) r5 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x9, 0x10001) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f00000001c0)=0x401) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x0, 0x0, 0x0, 0x0, 0x1], 0x1000}) r6 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x200) write$P9_RREMOVE(r6, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1251.842497][T25447] loop3: p1 p2 p3 p4 [ 1251.847320][T25447] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1251.862791][T25447] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:19 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ppoll(&(0x7f0000000080)=[{r0, 0xc2}], 0x1, &(0x7f0000000200), &(0x7f0000000240)={0x9}, 0x8) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x6a) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r8, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r9) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x65) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000500)={0x1000, 0xb, 0x4, 0x40000, 0x2, {r10, r11/1000+30000}, {0x4c64d37b76a541e9, 0x0, 0x18, 0x9, 0x2, 0x3, "cceee36a"}, 0x7f7, 0x1, @planes=&(0x7f00000004c0)={0x1, 0x8001, @fd, 0x9}, 0x6354b85c}) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) ioctl$FS_IOC_GETFSLABEL(r6, 0x81009431, &(0x7f00000003c0)) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x83c8d140af94a685, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000, 0x0, 0x20000, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000340)={0x30000, 0xc, 0x4, 0x70000, 0x9, {r3, r4/1000+10000}, {0x4, 0xc, 0x3, 0x1, 0x2, 0xb0, "a5b3706f"}, 0x0, 0x1, @userptr=0x8, 0xdf40, 0x0, r5}) getsockname$tipc(r1, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:35:19 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000001900"}) 01:35:19 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1252.121081][T25486] BPF:hdr_len not found 01:35:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x20, 0x1, 0x1f, 0x81, 0x7, 0x4}, 0x9}, 0xa) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:35:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1252.341822][T25494] loop3: p1 p2 p3 p4 [ 1252.452268][T25494] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1252.510317][T25494] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14) sendmsg$can_j1939(r0, &(0x7f0000000b80)={&(0x7f0000000a80)={0x1d, r2, 0x3, {0x702494bdc4234577, 0x0, 0x1}, 0xff}, 0x18, &(0x7f0000000b40)={&(0x7f0000000ac0)="318d3ae0acaed1fb34cbc331b5d0f397682a7923bdae79e345bf7087e382b55ff0c2ff44459bc3b980380a7d6923caaaa28349604c180c48febc7286c46cc84717e905b5dc2169aa02403f91094d7380227b39e979ffec745c947230d5fc8b38d7dca8e381", 0x65}, 0x1, 0x0, 0x0, 0x40000}, 0xc080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:35:20 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x5000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1252.892912][T25614] BPF:No type found 01:35:20 executing program 2: fanotify_init(0x58, 0x40000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2fd, 0x74, 0x2, [@restrict={0xc, 0x0, 0x0, 0xb, 0x3}, @restrict={0x7, 0x0, 0x0, 0xb, 0x2}, @func={0xf, 0x0, 0x0, 0xc, 0x4}, @func={0xe, 0x0, 0x0, 0xc, 0x2}, @func={0xa, 0x0, 0x0, 0xc, 0x1}, @datasec={0xe, 0x0, 0x0, 0xf, 0x0, [{0x4, 0x100, 0xffffffff}], "af"}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}]}}, &(0x7f0000000380)=""/249, 0x8e, 0xf9, 0x8}, 0x20) 01:35:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000035b00"}) [ 1253.062347][T25806] loop3: p1 p2 p3 p4 [ 1253.067189][T25806] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:21 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x60ff, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1253.220767][T25806] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x8) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0x9, "20cb4d"}, 0x6) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000870000000000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1253.293180][T25836] BPF:Total section length too long 01:35:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000ff00"}) 01:35:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={r3, r4+30000000}, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1253.457674][T25847] BPF:hdr_len not found 01:35:21 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x6000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1253.540979][T25852] BPF:Invalid section offset 01:35:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000ffffffff00"}) 01:35:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x105800, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) inotify_init() [ 1253.742459][T25964] loop3: p1 p2 p3 p4 [ 1253.747184][T25964] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1253.782341][T25964] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1253.801091][T25971] BPF:No type found 01:35:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000ff00000000000b0000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:21 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x7000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:21 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000200"}) [ 1254.098746][T26081] loop3: p1 p2 p3 p4 [ 1254.108980][T26081] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1254.134322][T26081] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1254.148644][T26087] BPF:Invalid section offset 01:35:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000200"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x102, 0x0) 01:35:22 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x8000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:22 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e00, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000300"}) [ 1254.475833][T26206] BPF:Invalid section offset [ 1254.506408][T26206] BPF:Invalid section offset 01:35:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc001000000a0a00044c050082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000380)={{0x8000000000000004, 0x2, 0x20, 0x0, 0xffffffff}, 0xffff, 0x5}) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000140)}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1254.533866][T26204] loop3: p1 p2 p3 p4 [ 1254.574924][T26204] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1254.591782][ C0] net_ratelimit: 24 callbacks suppressed [ 1254.591793][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.603248][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.612737][T26204] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1d200111}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, r2, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x54b}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x100}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xfe}, @SEG6_ATTR_SECRETLEN={0x8}]}, 0x58}}, 0x20000088) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1254.685071][T26316] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1254.693450][T26316] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 1254.702517][T26316] BPF:No type found 01:35:22 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x26cd5e0b) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) fcntl$setown(r0, 0x8, r1) [ 1254.825521][T26423] netlink: del zone limit has 8 unknown bytes [ 1254.834206][T26426] BPF:hdr_len not found 01:35:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000400"}) [ 1254.946713][T26434] BPF:No type found 01:35:22 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x9000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000500"}) 01:35:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xfffffffffffffef1, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0xe}, {0x7, 0x4}, {0x2, 0x4}]}, @union={0x4, 0x0, 0x0, 0x5, 0x0, 0x9c, [{0x2, 0x4, 0xc6}]}, @union={0x0, 0x0, 0x0, 0x5, 0x1, 0x7fffffff, [{0xe, 0x3, 0x5}, {0x10, 0x3, 0x9}, {0xe, 0x4, 0x7f}, {0xb, 0x0, 0x8}, {0x7}]}, @datasec={0x7, 0x0, 0x0, 0xf, 0x0, [{0x1, 0x2, 0x1000}, {0x5, 0x7, 0x8}, {0x1, 0xffffffd3, 0x1ff}, {0x2, 0x5, 0x6}, {0x2, 0x8, 0x8}], "11a9"}]}}, &(0x7f0000000380)=""/249, 0x390, 0xfffffffffffffcf5, 0x8}, 0x20) [ 1255.315415][T26549] netlink: del zone limit has 8 unknown bytes [ 1255.322196][T26545] loop3: p1 p2 p3 p4 [ 1255.327172][T26545] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000600"}) 01:35:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000400000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) socket$inet6_sctp(0xa, 0x1, 0x84) [ 1255.451210][T26545] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1255.563981][T26563] BPF:Section overlap found [ 1255.577045][T26563] BPF:Section overlap found 01:35:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x4000000, 0x4, {0x77359400}, {0x0, 0x2, 0x0, 0xff, 0x56, 0x4, "1a913725"}, 0xfffffff7, 0x3, @fd=0xffffffffffffffff, 0x2, 0x0, r1}) dup2(r0, r3) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r4, 0x11, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1255.711775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1255.717587][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:23 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xe0ff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) alarm(0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0xfffffffd, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:23 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0xa000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\a\x00'}) 01:35:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\b\x00'}) [ 1256.088928][T26894] BPF:hdr_len not found [ 1256.094259][T26888] loop3: p1 p2 p3 p4 [ 1256.110025][T26888] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1256.121756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1256.127575][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1256.133749][T26888] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1256.271816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1256.277638][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:35:24 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0xbe5a941, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:24 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\t\x00'}) [ 1256.735666][T26910] loop3: p1 p2 p3 p4 [ 1256.755759][T26910] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1256.815509][T26910] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:24 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000001900"}) 01:35:24 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffe0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:25 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0xc000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1257.194949][T27025] BPF:hdr_len not found 01:35:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000300"}) [ 1257.377043][T27031] loop3: p1 p2 p3 p4 [ 1257.426544][T27031] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1257.480583][T27031] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000005b0300"}) 01:35:25 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0xd605eca, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000500"}) [ 1258.127862][T27070] loop3: p1 p2 p3 p4 [ 1258.150459][T27070] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1258.198578][T27070] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:26 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x1000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:26 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x10000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1258.429846][T27162] BPF:hdr_len not found 01:35:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000600"}) [ 1258.585695][T27167] loop3: p1 p2 p3 p4 [ 1258.590905][T27167] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1258.599327][T27167] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1258.683453][T27172] print_req_error: 4287 callbacks suppressed [ 1258.683473][T27172] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1258.690638][T27167] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1258.732662][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.743642][ T2502] buffer_io_error: 4263 callbacks suppressed [ 1258.743655][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1258.760799][ T2502] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.771795][ T2502] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 1258.783251][ T2502] blk_update_request: I/O error, dev loop3, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.794196][ T2502] Buffer I/O error on dev loop3p1, logical block 2, async page read [ 1258.802338][ T2502] blk_update_request: I/O error, dev loop3, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.813222][ T2502] Buffer I/O error on dev loop3p1, logical block 3, async page read [ 1258.821287][ T2502] blk_update_request: I/O error, dev loop3, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.832284][ T2502] Buffer I/O error on dev loop3p1, logical block 4, async page read [ 1258.840853][ T2502] blk_update_request: I/O error, dev loop3, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.851774][ T2502] Buffer I/O error on dev loop3p1, logical block 5, async page read [ 1258.859791][ T2502] blk_update_request: I/O error, dev loop3, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.870710][ T2502] Buffer I/O error on dev loop3p1, logical block 6, async page read 01:35:26 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x18870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r3, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xffffffffffffff3e) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000280)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r5, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r6) r7 = getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r8}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in=@rand_addr=0x8, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r9}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x1007ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r10, 0x0) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r10, 0x0) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) ioctl$EVIOCREVOKE(r10, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev={0xfe, 0x80, [], 0x13}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r12}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x9}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb9, 0x3, 0x4e9}}, 0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r13}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000140)='4\xc9\x00', 0x2, &(0x7f00000009c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c64656275673d3078303030303030303030303030383030312c010000800000000061702c616363656f733d6303000000742c736d61636b66737472616e736d7574653d252a2d73656c696e7578776c616e31706f7369785f61636c5f616363657373215e7b656d30656d31765c2c00000000", @ANYRESDEC=r7, @ANYBLOB=',smackfsfloor=/dev/kvm\x00,euid>', @ANYRESDEC=r8, @ANYBLOB=',defcontexJ-t=user_u,hash,uid>', @ANYRESDEC=r13, @ANYBLOB=',subj_user=/dev/kvm\x00,uid<', @ANYRESDEC=r7, @ANYBLOB=',\x00']) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0, 0x2}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1258.878796][ T2502] blk_update_request: I/O error, dev loop3, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.889970][ T2502] Buffer I/O error on dev loop3p1, logical block 7, async page read [ 1258.898309][ T2501] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1258.909255][ T2501] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1258.925760][ T2501] Buffer I/O error on dev loop3p1, logical block 1, async page read 01:35:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\a\x00'}) 01:35:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8900, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r2}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r4}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r5, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r6) r7 = geteuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r9}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r10, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r11) r12 = getuid() r13 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r13, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r14) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r15}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r16, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r17) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r18}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r22}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) newfstatat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1800) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000880)={0x6a8, 0xfffffffffffffff5, 0x4, [{{0x6, 0x3, 0x6, 0x5, 0x5, 0x8, {0x0, 0x8000, 0x6, 0x2, 0x7, 0x5, 0x5, 0x3, 0x9, 0x101, 0x8000, r2, r3, 0x400, 0x9}}, {0x4, 0x0, 0x11, 0x0, '\'mime_typekeyring'}}, {{0x5, 0x2, 0x3, 0x286, 0x9, 0x100, {0x5, 0x6, 0x0, 0x6, 0x7, 0x81, 0x1ff, 0x2, 0x1f54, 0xe71, 0x401, r4, r6, 0x9, 0x3}}, {0x3, 0x6, 0x9, 0x3, '/dev/bsg\x00'}}, {{0x2, 0x3, 0x7ff, 0xffffffffffff7443, 0x7fffffff, 0x3f5, {0x6, 0x1, 0x4, 0xffffffff8e16b5c3, 0x200, 0x0, 0x6, 0x9b, 0x6, 0xcf74, 0xfff0000, r7, r8, 0x7}}, {0x3, 0x0, 0x1, 0x80000000, '!'}}, {{0x5, 0x3, 0x4, 0x1, 0x5, 0x1, {0x6, 0x4, 0x1000, 0x6, 0x2, 0x3c87, 0xff, 0x6, 0x3b5, 0x9, 0x1, r9, r11, 0x0, 0x92}}, {0x4, 0x0, 0x9, 0x3, '/dev/bsg\x00'}}, {{0x3, 0x2, 0x6, 0x49, 0x5, 0x728, {0x0, 0x1ff, 0x2, 0x7, 0xf07, 0x8, 0x5, 0x9, 0x9, 0x1, 0x100, r12, r14, 0x4, 0x8ad6}}, {0x1, 0x7ff, 0x7, 0x8a, 'wlan1#('}}, {{0x4, 0x0, 0x7ff, 0x200, 0xffffffff, 0x2, {0x1, 0x5, 0x2, 0x1, 0x3f, 0x2, 0x100, 0x81, 0x7a300000, 0xb60, 0x5, r15, r17, 0x80000001, 0x8be}}, {0x5, 0x6, 0x9, 0x1, '/dev/bsg\x00'}}, {{0x2, 0x3, 0x1, 0x6, 0x86b, 0x7, {0x3, 0x8000, 0x0, 0x5d0e6123, 0xef, 0x8001, 0x7, 0x8, 0x9, 0x7c, 0x7fff, r18, r19, 0x101, 0x2bb4c00}}, {0x4, 0x23fb03b8, 0x9, 0x2, '/dev/bsg\x00'}}, {{0x5, 0x2, 0xa070, 0x7, 0x1, 0x9, {0x0, 0x3, 0x200, 0x95, 0x40, 0xf9fc, 0x9bf5, 0x0, 0x44, 0x200, 0x7ff, r20, r21, 0x1, 0x8}}, {0x2, 0x4040, 0x27, 0x8, 'userem0cpusettrustedvmnet1},bdevvmnet1@'}}, {{0x0, 0x1, 0x100, 0x100000001, 0x8, 0x8, {0x4, 0xb0ba, 0x38e, 0x1000, 0xffffffffffffff00, 0x3f, 0x2fbb, 0x8000, 0xffffffff, 0xff, 0x3, r22, 0xffffffffffffffff, 0x1ff, 0x7fffffff}}, {0x2, 0x0, 0x9, 0x6, '/dev/bsg\x00'}}, {{0x5, 0x0, 0x7, 0x0, 0x0, 0x400, {0x3, 0x9, 0x2331, 0x1, 0x8, 0x9, 0x9, 0x16, 0x9, 0x80, 0x7f, r23, r24, 0x5d, 0x7ff}}, {0x6, 0x3f, 0x6, 0x83, ',{ppp0'}}]}, 0x6a8) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r25 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80000, 0x0) ioctl$RTC_WKALM_SET(r25, 0x4028700f, &(0x7f0000000040)={0x8, 0x0, {0x3a, 0x3b, 0x7, 0xe, 0x8, 0x2, 0x1, 0x158, 0xffffffffffffffff}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1259.134161][T27190] BPF:No type found [ 1259.166839][T27186] loop3: p1 p2 p3 p4 [ 1259.195840][T27186] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1259.222389][T27186] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00'}) 01:35:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r2, 0x0, 0x70bd2b, 0x25dfdc01}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x26044005) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x210, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000}, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r3) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x3f, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000200"/26], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:27 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:27 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x19870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002580)={0x29, 0x0, 0x38, 0x53, @scatter={0x6, 0x0, &(0x7f0000001500)=[{&(0x7f0000000000)=""/80, 0x50}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000080)=""/65, 0x41}, {&(0x7f0000000240)=""/208, 0xd0}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000001480)=""/77, 0x4d}]}, &(0x7f0000000140)="147c39c3566774e970f52e4cd2b0f7d82621cfe14cfa59a4b18bdcb686a0e71291d4b1ac1c292ee8da32bb02c53049df369b2048a1acc7d9", &(0x7f0000001580)=""/4096, 0x9, 0x10007, 0x3, &(0x7f00000001c0)}) 01:35:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000001900"}) [ 1259.703635][T27518] BPF:hdr_len not found [ 1259.852219][T27525] loop3: p1 p2 p3 p4 [ 1259.865851][T27529] BPF:No type found [ 1259.871158][T27525] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1259.881773][ C1] net_ratelimit: 18 callbacks suppressed [ 1259.881783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1259.893227][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1259.915416][T27525] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:27 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000009000072000000000000000002827a8f62f5ccd49409a126a5ef934145016ab4855ab86826d4f44c81574433f8fb6e74d354bfeb89cebbc72ffe2ba2982d80be06000000f893f71f949b83c9b0b5343d8f085cd58aac94b16fe60c329eb517c508e07364a22ff4690e45300ca4cc4479ead1c7ecd8fe951aa4db80941ba2f29e04000000de4e730000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000140)=0xffff) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) r3 = syz_open_procfs(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000240)={r4, 0x0, 0x3a1}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000040)={r4, 0xfffffffffffff78c, 0x800}) 01:35:27 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00?\x00'}) [ 1260.232925][T27642] BPF:Total section length too long 01:35:28 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1a870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1260.272159][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.278148][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.310962][T27646] BPF:No type found [ 1260.431761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.431768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.431793][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.437592][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.511767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.517596][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:35:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00@\x00'}) 01:35:28 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) getpgid(r2) ptrace$getenv(0x4201, r2, 0xffffffffffff8716, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x101201, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r5, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r5, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000100)={r5, 0x5, 0x10, 0x5, 0x8}, &(0x7f0000000140)=0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f0000020000010000545787d2e2d5608d70991391db807471e2c789e683ea69db705754a954da8f2079d25d265f8c9af15d1ce54b4ede66b03e438329bf58af4b6e4ddbae40b9d873c5af31b74d4ab063bbe899b2048befddd31058a4bd55d7c3ee48efb9fb258ea86a554dd306fe2337cf659a5646d73f5b9ee73b3fc1d477525b657358aae468f3f4e4d86a0c19f67101581ef201ef67270974528ad3084343902ce6b7ad19cb5b8c2a924b0dfb79024f63a5b3c378c977f55ce4de7f270798dfb3"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1260.698874][T27952] loop3: p1 p2 p3 p4 01:35:28 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x3000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1260.743172][T27952] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:28 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x3) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000200000000006920234c981d553f32dd00568a97184f43e1b3fb44fac537b1adf7a2d6ff3ebd700fb75f2c28b3b966b93a"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xcbf67bf4a9bb64f2, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000040)={0x6, 0x1000, "03327d", 0x7f, 0x17}) 01:35:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={0x0}, 0x2000, 0x200, 0x0, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1260.852428][T27952] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:28 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000380)=""/249, 0x1b, 0x29, 0x8}, 0x20) 01:35:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000035b00"}) [ 1260.985071][T27989] BPF:hdr_len not found 01:35:28 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1b870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:29 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xa00280, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r2, 0x80304d65, &(0x7f0000000040)) clone(0x2100700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9f18000022000000000000000000000000020000000000"], &(0x7f0000000240)=""/248, 0x17, 0xf8, 0x1}, 0x20) 01:35:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 01:35:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000ff00"}) [ 1261.402749][T28111] loop3: p1 p2 p3 p4 [ 1261.419931][T28111] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1261.465871][T28111] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1261.479643][T28127] BPF:No type found 01:35:29 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x208000) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x50, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [0x0, 0x0, 0x8e4297df43c27d04, 0x30, 0x0]}}, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10040, 0x0) write$9p(r2, &(0x7f00000002c0)="6ec0b20f881435fd82728f4b0820fd6685778c1344511125b7d444b05d836489c377a1c18e83ffeeb539c02b238bf8f401bac7e51ee567d0742145b729ea1fb8bf4364581547638568abe786fb9087c773698834924d0be22e70d5b00e6abd456641631ebed3bb64da20297b6385d6f699e69ce3bfb699713ffb1e6ec9c9074e0ab1f0721704a8ae4bc94b9b3da84f380413a49960a8b6e84a6cbd533d53d0f323b449e798cdb2bb3c66f6b0f3a7ed899b53d3e995d99b", 0xb7) 01:35:29 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1c870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1261.768182][T28234] BPF:hdr_len not found 01:35:29 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x4000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x20400, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) 01:35:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000200"}) [ 1261.858109][T28271] loop3: p1 p2 p3 p4 [ 1261.872269][T28271] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1261.883282][T28271] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1261.953605][T28448] BPF:No type found [ 1261.960257][T28448] BPF:No type found 01:35:29 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000180)={0x18, 0x0, 0x3, {0x1ff}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9fe300000002000000000000000000000000000000000000000000f155d158cf63db2c5d3e2594d0"], &(0x7f0000000380)=""/249, 0xffffffffffffff36, 0xfffffd1e, 0x8}, 0x10f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r1}) [ 1262.089878][T28560] BPF:hdr_len not found 01:35:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000100"}) 01:35:30 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1d870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:30 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000004000000000000000b5670000000000000000ed9d56c94226a7749827887e2b9cd14318601ffd3d7a0a99708efd6f804ae2c1ccd32c44e1c3c4736d05ad1566b3c102dac9d72bb30000ff59d58d586657d3a0ad9e88163e23e72e0afb9497134c11f4e2f0aa6f0ab65b37430a0eb6fe997ecb08dec048955095007aa1c62d"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r3, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r3, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r7, 0x4, 0x42000) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00002bbd700001f3df250100000000000000084100"/33], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x26044005) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r8, 0x400, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x830}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r5, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r5, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={r3, 0x3f, 0x9, 0x40, 0x1, 0x8, 0x5, 0x6, {r5, @in6={{0xa, 0x4e24, 0x8, @remote, 0x3ff}}, 0x0, 0x8, 0x1000, 0xdd, 0x8}}, &(0x7f0000000100)=0xb0) 01:35:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x40012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = timerfd_create(0x7, 0x140000) ioctl$void(r2, 0xc0045878) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') io_setup(0x5, &(0x7f0000000080)=0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') ioctl$VIDIOC_G_SELECTION(r4, 0xc040565e, &(0x7f0000000840)={0x5, 0x7d416f1c434c7945, 0x2, {0x2, 0x5, 0x4, 0x800}}) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x0) r6 = userfaultfd(0x80000) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x0) unlink(&(0x7f0000000880)='./bus/file0\x00') r8 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r9 = eventfd(0xffff) r10 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x2000, 0x0) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcs\x00', 0x400, 0x0) io_submit(r3, 0x6, &(0x7f0000000800)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x2, r4, &(0x7f0000000240)="b9a939e1e9e0c42f81569e4a5eb9519530642c2e8276aa1fe33f51a90d53901aebaeef7ba8966cceed8973bdaa19c4330eca2f3305ae25fcbb29a621dc120d5d714e6c9b168d10077e8be535d2d35daff2dc845983d891db5568df9f69307cd587a7ce54b3a591bb2ba9f1ccc30a318faf9b90016da0e913b9928d7f5f51b7924d7a69d3b51a242f5dad5474be09a19871dcf19cb76fa9e62fe11e", 0x9b, 0x7fffffff, 0x0, 0x2, r5}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8, r6, &(0x7f0000000480)="f57a660d207696e16128a11c56f5351b6b26a141f8f23f641c9b277741b406995842ccff6323e5136dc35b811d4fb4b91898ad641e4cc736bb8ac7bb6facb692b05d06d348b68a718d07e791fe4d7b72f067f4df7e1b924c24ee6a47930b50243a2925ad1b6c2a65a3adc0afef6f9f02b5cc40a382efdf4680e30b649563d087d3e2fad3106904126bce0437352347c0dce35f836186d0b9b9beb459820bb1962766b1b05722719b77549070441a102128ab2f8811d2ea6ac938", 0xba, 0x6}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x8, r7, &(0x7f0000000540)="347a165b669f67998ad07e9461634c3870354b8b56f45ae3f72fd31f279da024b79faa774e929e54f1ffc6b0f0369dff8ebf55bb65a1d59f6ae4e935b338ab06af75706ae1f5677ef620c9562601bc812d159dfcd9fba4e04a97b50198ede5eccd1462b9a698fb2099f3e93a56dce902178117a5cc6a85ecce35dadd5be784884e57b8025cbea6d17e03759e1506d44356222a700bed4aebb068387f6a941725afc418cf3978861bd802", 0xaa, 0x4, 0x0, 0x3, r8}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x8, r2, &(0x7f0000000300)="1e4583f4a37f6e71597bf15537b5f25e0eec867e95ae0e35936a", 0x1a, 0xcd6b, 0x0, 0x1, r9}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x3f, r2, &(0x7f0000000600)="79a7ba25355ce35f7b8d6c8f18d6a20ca13dba119b5235baaf31bb844dce11a80e5324e3adfe21e0c9ca9de7a97db0655b459f8b4283fee084d899695c721e81751ff2734158b66825e1dcca52645f789c1dbf58abe001bcf1b521b6b0be0192d45737fd79a166b8e45e1316d663c91483ee7d7f8a74c9b698fd675d0691d1351a89889c78a91afc47d9b63ebe20", 0x8e, 0x4, 0x0, 0x0, r10}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x451, r11, &(0x7f0000000740)="00e3b696c6810be240", 0x9, 0x19, 0x0, 0x0, r12}]) [ 1262.417698][T28683] BPF:Invalid section offset 01:35:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000200"}) [ 1262.503035][T28685] loop3: p1 p2 p3 p4 [ 1262.504803][T28691] BPF:No type found [ 1262.518099][T28685] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1262.555531][T28685] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000300"}) 01:35:30 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010038000000000000000000008000000000020000004500"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES32]) [ 1262.933075][T28963] BPF:btf_header not found 01:35:30 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x5000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r4, r5) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xffffffffffffffbd) r7 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x20000) ioctl$UI_SET_SWBIT(r7, 0x4004556d, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000000000200000000006df9a316f8614dc65fea41b9896b418ad6a1d77e274c8230528bfd9e66a4bf7d0df0453e18c8c9b09dad276caf92de6b4ffc9b51ca12b8b7daeea2c0cf4fb19c2bcc3796f4f9ad7adeb072381907baed4b40dd945e243e70fc8858904189442c8f41b5e6231f0a5d6502ac0d2b5943c820e47944dbd729e1b33916399f0faf18daae0c2c0173cb814970274e50a311a5c503a8fdb0bf0f19282394c601ec13dd4ff4d16f66210c8bde31e46ca612957869ef075a520dd978a7e02ad1db2c2d03aaaed4b885932b915f844d4143d41ce93516ee"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1263.021493][T28963] hfs: unable to parse mount options [ 1263.100957][T28963] BPF:btf_header not found [ 1264.991768][ C0] net_ratelimit: 24 callbacks suppressed [ 1264.991779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1265.003273][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:35:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000400"}) 01:35:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:32 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1e000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:32 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x100, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0x1, 0x7, 0x8, 0x6, 0x8, 0x6}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010609000001009a78f8a385e2291dff03af7e10ad55fb237bb2207ab3c11700000000000080b5bc872d"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:32 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x6000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x108205}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x7c, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xe4aa231c9aad5aee}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x658}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x1, 0x4, 0x800}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x800, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r4, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r4, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r4, 0x1ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r5, 0x3f, 0x401}, 0x8) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000500), 0x4) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x6) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000540)=@assoc_value, &(0x7f0000000680)=0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) setsockopt$llc_int(r6, 0x10c, 0x9, &(0x7f0000000040)=0x43, 0x4) socket$alg(0x26, 0x5, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) syz_mount_image$xfs(&(0x7f00000006c0)='xfs\x00', &(0x7f0000000700)='./file0\x00', 0x4, 0x4, &(0x7f0000001740)=[{&(0x7f0000000740)="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", 0x1000, 0x2}, {&(0x7f0000001800)="68666480d5b69d5c2c54b771d712631ea4a4cf28742f2daa293be93ede1fafd13cd7af24609efccb15182c2771713fa10648a4b8b88022060d64e4215f7d37db4a6783d283000b4ca254c2373ccecb6bdde996036a4aa359d76bb21e7ec1f05ae8dc1b7cf27364f41df6516bf4db4ea8f3686acb97e9941272be0361909e3f36532ee0a02c252230cc1473e091ade4b286f728c269181df5745b5b6cdaaf67350ca7b56791c820f9706f7df5d4f277b265591abb12c570e7b451c17f264b8d67fa59dc69dff2bcc7437e646da88cd1", 0xcf, 0x7}, {&(0x7f0000001900)="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", 0xfa, 0x7ff}, {&(0x7f0000001a00)="2322a14a456b83d71210172e3fc21863c27b6debcc789260a4cd2ba23d38abc50add0d33cf43bbc8c8cc9c2c9724110f780c4f7648f8430bbdcf90676de99cbc2adbff0929cba2633f2e157c1d6b577adf23649e2c9f91aa1feacd756f355cb6d052372e9f3d5d6f48cc7950ef3637fdfc636c1aed16a52fb0a151b69022f7b22502658d7118399ae08f83f5991e230169f52851e58ca0a77959a77a5073d26067ef6e7689aeb3d1d4e57d2d733fb8512c5fd1a6cebdd55f581f15560425df13ae506c0765ce13450fbd8ba24a1ae2052eeed5", 0xd3, 0xff}], 0x4, &(0x7f0000001b00)={[{@quota='quota'}, {@nodiscard='nodiscard'}, {@ikeep='ikeep'}, {@qnoenforce='qnoenforce'}, {@gquota='gquota'}, {@discard='discard'}, {@filestreams='filestreams'}, {@prjquota='prjquota'}, {@lazytime='lazytime'}], [{@uid_gt={'uid>', r8}}, {@smackfshat={'smackfshat', 0x3d, 'GPL%'}}]}) [ 1265.093564][T29415] BPF:btf_header not found [ 1265.129788][T29422] BPF:hdr_len not found [ 1265.132366][T29419] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 01:35:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000500"}) [ 1265.181228][T29419] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1265.235584][T29421] loop3: p1 p2 p3 p4 [ 1265.240787][T29421] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:33 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000000004df580530f00000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000100)=0x7) [ 1265.297320][T29421] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:33 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1e870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000600"}) [ 1265.467989][T29642] BPF:Invalid section offset 01:35:33 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15f, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xfffffffffffffe9c, 0x800008}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe, 0xffffffffffffff67, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16=0x0]) syz_open_dev$mouse(&(0x7f00000015c0)='/dev/input/mouse#\x00', 0x8, 0x400400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) accept$netrom(r0, &(0x7f0000001600)={{0x3, @bcast}, [@rose, @netrom, @bcast, @bcast, @default, @netrom, @default, @null]}, &(0x7f0000000040)=0x48) 01:35:33 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x10000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000f6ffffffffffffff000000020000000000"], &(0x7f0000000080)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1265.673160][T29754] loop3: p1 p2 p3 p4 [ 1265.683701][T29861] BPF:Invalid section offset [ 1265.741924][T29754] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1265.804596][T29754] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1266.020482][T29754] loop3: p1 p2 p3 p4 [ 1266.030402][T29754] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1266.055211][T29754] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1266.121785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.127624][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.521765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.527621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.671790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.671869][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.677585][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.683322][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:35 executing program 2: r0 = mq_open(&(0x7f0000000000)=']mime_type\x00', 0x1, 0x1, &(0x7f0000000040)={0x3ff, 0x4, 0x8, 0x401}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f0000000240)=""/229, 0xe5}, {&(0x7f00000000c0)=""/168, 0xa8}, {&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000540)=""/170, 0xaa}, {&(0x7f0000000600)=""/213, 0xd5}, {&(0x7f0000000700)=""/153, 0x99}, {&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f0000000840)=""/195, 0xc3}, {&(0x7f00000001c0)=""/29, 0x1d}], 0xa, 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000a00)={0x0, 0x8, 0x20, r0, 0x0, &(0x7f0000000340)={0xa20920, 0x4, [], @value64=0x64}}) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000a40)={0xd3, {0x7, 0x9, 0x9f, 0x8001, 0xffffffff, 0x1}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb0100180000000000000000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:35 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1e3) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="46953fec8d522d924f6de68a69e8461e7379e678cc89371df40443a2095276857bf98accadac9cd82d51f03e82a91473cb03ceb067939272187b7307d4dd9a8a566324a38b83519203a79ce391e5075ddb5fb7f4fb2bdb5ddafe44305b36a92dd10c386d63093a76c8e3ed6adf5f4fdd0b230c6156f5d3cf2db353c1b63d8bfd800688737681f22ec304fb4ba39e27d0e15dd705b22a34a38bb876a13efd97c2252f25461cc3a696a64872471b615c9202fc7b28cfd06c23f114979b4c99bbc4dd6d051576f8508179ad795684ba2d0af721df9c4d23e14e6925e60615a723f9354e6623519298ed52f81969decd37175f0e") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 01:35:35 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:35 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1f000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1268.242117][T30179] BPF:hdr_len not found [ 1268.259712][T30181] BPF:No type found [ 1268.278007][T30178] BPF:Unsupported section found [ 1268.332492][T30177] loop3: p1 p2 p3 p4 [ 1268.387521][T30177] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\t\x00'}) 01:35:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) [ 1268.470212][T30177] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1268.665730][T30303] BPF:No type found 01:35:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000001900"}) [ 1268.698964][T30303] BPF:No type found 01:35:36 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x1f870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020100000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x3bd) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) statx(r1, &(0x7f0000000040)='./bus\x00', 0x6000, 0x400, &(0x7f0000000240)) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000000)={0xd, 0xfffffff7}) 01:35:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1269.045459][T30416] loop3: p1 p2 p3 p4 [ 1269.059976][T30416] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1269.089581][T30416] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1269.095191][T30607] BPF:Total section length too long [ 1269.124723][T30607] BPF:Total section length too long [ 1270.271786][ C1] net_ratelimit: 15 callbacks suppressed [ 1270.271796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.283265][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.671765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.677622][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.831758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.831765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.831789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.837690][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.921773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.927613][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget(0x0, 0x3, 0x4) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x1, 0x23b6, 0x2]) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000000000233ece4560433805604196681b4455382e67dab4a04bbb7cef93a38d3d5debce08b0a8a8f419568589f9"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0xa10000, 0x2, 0x1, r0, 0x0, &(0x7f0000000000)={0x990967, 0x0, [], @value=0xfff}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) ioctl$sock_proto_private(r2, 0x89e0, &(0x7f0000000480)="4870ec0b233691306633bf752c49f2cdcc9a9138ca4ec9427b519f6dcf8a3e92d73cc18fd500eaaff7ea952aea435ac2d09346e8fa0fb609b97641efc2ed719c3e74e0d3a981c67c1af243f7cac2e03aa2da8839009aab51e30f0bd04053c13b9d06b428d380902d925aacdad4c03f706dde0e0016aaea281725a2f84a13e400178bcd03efaa8408f94359e186631a60e995a56890bbba27939d7612749873c6b767273a8ed0102f5498aec2de457b5a886a6f01b8357cdba6c7f5568fb7ab66d4e1ce159354f24506b43357691c9fd9f8c791056d2f419b") pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000002c0)=0x3) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 01:35:39 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x20000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:39 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x20000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 1271.342958][T30827] BPF:No type found [ 1271.368239][T30835] BPF:hdr_len not found [ 1271.372783][T30833] BPF:No type found [ 1271.426309][T30827] hfs: unable to parse mount options [ 1271.462616][T30847] loop3: p1 p2 p3 p4 01:35:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000080)=0x1) [ 1271.484674][T30847] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1271.525826][T30847] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1271.580041][T31049] BPF:No type found [ 1271.587701][T31049] BPF:No type found 01:35:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000035b00"}) 01:35:39 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x20870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@ptr={0xd, 0x0, 0x0, 0x2, 0x2}, @enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0x1, 0x8001}]}]}, {0x0, [0x6f, 0x5f, 0x30, 0x0, 0x30]}}, &(0x7f0000000380)=""/249, 0x3f, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}]}, 0x28}}, 0x40008000) 01:35:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x300, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="20f6c27564196ced6fb2f1dfac096bab", 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1271.876313][T31163] BPF:[1] Invalid name_offset:13 01:35:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000ff00"}) [ 1271.909903][T31172] BPF:No type found [ 1271.923246][T31168] loop3: p1 p2 p3 p4 [ 1271.927917][T31168] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1271.949076][T31168] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1271.982369][T31163] hfs: unable to parse mount options 01:35:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:42 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000040)=0x200) read$usbfs(r0, &(0x7f0000000080)=""/176, 0xb0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x21870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/236, 0x1a, 0xec, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000200"}) 01:35:42 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1274.419750][T31588] BPF:No type found [ 1274.427813][T31591] BPF:hdr_len not found 01:35:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysinfo(&(0x7f0000000000)=""/34) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1274.472638][T31590] loop3: p1 p2 p3 p4 [ 1274.479524][T31590] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1274.494610][T31590] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000100"}) [ 1274.641944][T31714] BPF:No type found 01:35:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x22870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101080, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000002002417000000000000800000000000000001000000200000000000000056ec512e00006a9b184c6ee60c6489b0418c9a979500004a000000000000006a0200000000000001000000000000006d15000000000000000400000000"]) 01:35:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000200"}) [ 1275.031907][T31837] loop3: p1 p2 p3 p4 [ 1275.050891][T31837] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1275.071430][T31842] BPF:No type found [ 1275.105900][T31837] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1275.119321][T31842] BPF:No type found 01:35:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000300"}) [ 1275.391799][ C0] net_ratelimit: 22 callbacks suppressed [ 1275.391816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1275.403844][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.511782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.517742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.921774][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.927576][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1277.071783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1277.077864][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1277.081796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1277.089479][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:45 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x23000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000800000000000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x82, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) uselib(&(0x7f0000000080)='./bus\x00') r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast2, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 01:35:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000400"}) 01:35:45 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xe0ffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:45 executing program 0: clone(0x3000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="0000009323792654336c5d40487409af4195"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) [ 1277.485903][T32181] BPF:Invalid section offset [ 1277.510148][T32186] BPF:hdr_len not found [ 1277.572586][T32188] loop3: p1 p2 p3 p4 [ 1277.577294][T32188] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1277.592445][T32188] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000500"}) 01:35:45 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x23870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000002000000000006be6ca8473a3a700f7f4edb6f4be849f16f544313a13addef719d9ae88c50e30a728de3e96e6fb382cd357fc4474f83d7961ea30617662866197c89d90a4a6ee335d3b2308db2f725701735968a022b515c0717ca00e6dbe303"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:45 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)}, {&(0x7f0000000140)="b0631ccbca3336f1423534528e0952fa95810ddd00d8fa8bad6ba26e259fed19c531fd10f046b0ff779c13671fab6fe101183db7e30a729d33b872f6", 0x3c}, {&(0x7f00000001c0)="518a5eb7d3ba87b574e3efac524c9ae62710e1c5e7495556453bccd1e0b43db774b7345a1fbf22a77409667a5ae07eab3bb049f67d55c64680899e94b8107558b95fda2081f7b7141f41a387c9", 0x4d}], 0x3, &(0x7f00000004c0)=[{0x70, 0x114, 0x1f, "37b39e3f517150935487b38a2481641fb196fada2a1b13fa4eaad48e608d33c9840478553ae8f1e8ab7538091e121ffa196ba071afc3275f6593d83a5c45d2cebc8b2de86af43e03eb5661e576345b8dafe1937a4ea8aaafd8602b988158"}, {0xe0, 0x4f8c7f13932a2b89, 0x6, "92ecf8445033ae7b6975731b80bd8e738ebc9965486a73452f4946c7790767d707323d15db99bd482191361eea64ec5479ddc751f979a5f1e32f5545dbecb8e2d4e8a41ad7ccc43f7d2d5b1f3048c7f0d1f58da72160abc46d24e490f7156927feb087ca27a6292fb243fd239bb9d69697538a04ab3f5827353768cb7e1247cc3571935ea56a7abb1aa08b74b4c0e2f6ab8f03950832a712ed5b16b29f75cf7458a84d6e41f5900290fca7a1aa7adc51e4a8841d7df24c86006b4c7fa412d5817696e8bf0632391e6d3d9adb"}, {0xe0, 0x102, 0x4, "483b21c343993985df07b4cffa82ba993d5637fe189a9cf7a4fca09dcd73652dacf0c8d5bf41ace2072fe7d175303dda65d2f2e78ed980f1e7035654240fbc50d4cb9e6d66d6847b4c8ec2db7385375a158d40535559c3d2db6b3ad0cd34eeaf5b759c54170a5bff7db930cf327545b6f0739e3334019c8d322f37d0de4049cde265badebf3cfb12fa27c337c2db73eeb41768b9659dd4164221895ef36d96ccc91dcc082e20aca91d4696cb2717135f04961639810836f5513ed3a44cd09c802f086b2bea2c877a6aac20"}, {0x108, 0x29, 0x9, "7887bf24ca9de3194022aaceba04b3dbfbc93afef959b1eb97d8d3cb323c1b967521679cc8f61f8753be43ae76269c75fc1047c1a7958b744d6bce95232688b2b86b2700b821428a58ba6d377ca7a94facef24aa2f202102ed24fc28861be4e9ba9057b7969074043fb44253ba0cdbd87785f62af12268741f2927f0467b6194c63b185386ea07ad4142c388fdf8359259451a34c1e26f2c5be3cf42d6c345ffc6e2bb2a163a888c3edcd6caef596268a341681f1f287c2012efc53757d8d55e7cca6fa0b7c029802d4fb91efe5d30326d04ac1e745f9e398c2bdeed5b54ebf2930d0022fa0de7c4a0bd044234ec5b156dc018c93ae3ed"}], 0x338}, 0x20000841) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x61, 0x2e, 0x61, 0x57]}}, &(0x7f0000000380)=""/249, 0x1f, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x10400, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x2d) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@int=0x70, 0x4) [ 1277.959770][T32427] BPF:No type found 01:35:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000600"}) [ 1278.011508][T32424] loop3: p1 p2 p3 p4 01:35:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$TIOCEXCL(r0, 0x540c) [ 1278.068183][T32424] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1278.109809][T32438] BPF:No type found [ 1278.130338][T32424] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x24870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000000002dbecb5c54d3d1163a0000b601000004000000002e0000"], &(0x7f0000000380)=""/240, 0x1c, 0xf9, 0x8}, 0x20) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x22442) 01:35:48 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[]], &(0x7f0000000480)=""/249, 0x8, 0x211, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000000)=0x23b9e89e, 0x4) syz_mount_image$hfs(&(0x7f0000000240)='Lfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5b25b7117f827ced, &(0x7f0000000000)=ANY=[]) 01:35:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:35:48 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfeffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1280.548996][ T309] BPF:hdr_len not found [ 1280.581276][ T314] BPF:Invalid section offset [ 1280.596069][ T313] BPF:Invalid magic [ 1280.607391][ T314] BPF:Invalid section offset 01:35:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1280.667391][ T317] loop3: p1 p2 p3 p4 [ 1280.672089][ C1] net_ratelimit: 16 callbacks suppressed [ 1280.672106][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1280.672129][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb1}}, &(0x7f0000000000)=""/257, 0x1a, 0x101, 0x8}, 0x20) [ 1280.737995][ T317] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1280.767764][ T317] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1280.823122][ T537] BPF:Total section length too long 01:35:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x15) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000140)={0x4, 0x1, 0x7}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x3, [@volatile={0x1, 0x0, 0x0, 0x9, 0x2}, @var={0x7, 0x0, 0x0, 0xe, 0x3}, @datasec={0x7, 0x3, 0x0, 0xf, 0x1, [{0x4, 0x1f, 0xff}, {0x3, 0x9, 0x2}, {0x2, 0x3f, 0x8}], 'a'}, @datasec={0x4, 0xa, 0x0, 0xf, 0x1, [{0x3, 0x7, 0x6990}, {0x3, 0x6, 0x7c}, {0x2, 0x0, 0xff}, {0x3, 0x9, 0x80000000}, {0x3, 0x8, 0x8}, {0x2, 0xc0e, 0x23}, {0x1, 0x401, 0x9}, {0x2, 0x6, 0x668}, {0x5, 0x9, 0x7}, {0x3, 0x8, 0x37ff}], "a9"}, @datasec={0xb, 0x3, 0x0, 0xf, 0x3, [{0x2, 0x8, 0x1ff}, {0x3, 0x8, 0x3}, {0x2, 0x2, 0xdf4f}], "690fb7"}, @typedef={0xc, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000380)=""/249, 0x12f, 0xf9, 0x8}, 0x20) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', r1) 01:35:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) 01:35:48 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x181000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xb, 0x4010, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) syz_mount_image$hfs(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4004, &(0x7f0000001800)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64], @ANYRESHEX=0x0, @ANYRESHEX=r0, @ANYRES64, @ANYRES64=r1, @ANYRESDEC=r5, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT=r6, @ANYPTR64, @ANYPTR64, @ANYRESDEC]], @ANYRES64=r8, @ANYBLOB="445a3aa1de0e9b0309b2e74d63440c8ee8861a9a6517db5f0fccaec7db7e1f7423ef33856ace539936c5791c6d67c6b7a43a0bab6b5a95c9c8a186e78e00f68e98bfa0b110ddb18f5c6afe49cc97799d648c5459833f01966ddb3a0a1fde7b0e5a406c41ce61b7f93f78d23dd3ba00fb22929d19bdb188700a6a8d6a147c4a961cbe4067f0b40f53ea3a5a8a76630879fdda0d416c043c7f9f7d6260ae99beb39543994a2637e38162b357127db9810ad30c9d58b2b11796430ff3564dfe4866c83d9a603b237debd59e3b793ba0404d121b6fb6916afbed117d30285c574cb1135e4d576a2286e11945d5ffb60ad17660686c0bf0b77c043a5166afedc11e4cfc39fc7a0d8ddfdd2a880ee3ad8b479e8a6a0bd9591cab2f1811eeae0b714480aaed102d6e519e8fd76f887b6ed8fd6cb49f464e35c7d92e7e8811e9b819b87ba7fdf09f745b243043b8372573745164948cc40d190ab59921714f7fbbb411327f7b0f0ea23a982fc977e9cdb3a2c93d6848c298e0951078da00bc6dfe88075961c1981010e26f926ef67fca7b8474f86154cc8cee69a76b667a0e3c29b4caa04292f6ffd9d7a0cd8a88cfdc9887b9b1f014fe789927315f6cd884555e448b5c26f34eabc8d467cd27594edd5e9a2a5676a4e2429c6cee7f862542c34f6da3c99f3dff299ef2b6e580b50fdaf7e60f3902642bd69e6389f4b43cf0942e70a2577fb6be911585929d6952d8ab61525713378e2d7b4cb42f9f9b11f8cbffee6b506d8194b9cbf05419d7728b7e3b3793cc071a81b937169f7b24440bd154bad3600ad598b1a712d09a4e426021a6badb8b16abb62d9f40544b93912233d42e0995bfcf2ea21cb40ebe4c09bfb3c4c843fab8991674257e99a8fc773ec44bd216ed2c9cce2d67332f473e531d2ad4c540ac936c6c036ba5ab3833f5de0dcb71130db70205dd69a0f803d664c3dad3a2512f2c96ec793fda6d0ea9c593efba139613f25d56cdd9502170d83e1557105e40aeefc30d0b5c50457138b5c46359a8314714b70cd2f6acc0d8b9e1b0b92758e6a0a3ad7e6b2dda725663e216bd74b599a57c9caf510e82e5eca80b4f6d4db07b76631c0e70422d1bd5ac5da825aaa9b92050d2ef699eca9f053ed78a336c3f3c7e6cdd382623c6de6597089ae8d688e9a62a5472ecdcbdf7b9c1fa43c2dc263133c876e1886823160bebb5f14de2c507d8c51225c4bb7e1e7ed4a175cfbf1bcc9300cba987bfc8e426d03ab8ca240849ede7c9c785c6c40d711784f3ad9c483fca8d72eb04f44062aecf503dd6438d41e7aa840be15f8fd6eff16a1a52811cd6a7997c0f1fe71f391a7525e47f8ee5d5d0ab3ba58fb4d70a3785929246918450ff5cb4f53663eac9fb7195ac14e018b7a17088d41eedcce2b368b7803fe7cda0939ce143fb3c9e172653c71dd96df1f928339aad5843cea8fcdf32bfae452d6789ba7b14487940e252c42d61adb2d90ca16ab1c7d745aafb432ffb3a06c0d5002fc433148cd58d49262a819adaa10f09dcbb6b06d619daab5f1ba6e291cee5c1eb0b562b114f65b2abf5b18e71327e7db0ea8608f70efbc07f5dc46152a03ad83f67f38d7278eb1eb98fcc6d75bd2b6c3a159584747813e1bb985bb8f301b7d550076883fe9b654031b5235648676fa949a025249216c4dbb1f02f71e3911e19579260b1ab22b3db6980149eef818ab29576c71e2bd4f6de852334d9a847d2df8d6ac2b0cb0d4d8007afc456de19a7727d9b2be25d6a9331084f8fbf81da21c44a0edd8b3fc4990516a947c44bb0fada5895a1bead9b34a1ed8b16a1f17cbe2126bf2014ec33b0dc51c172217ac1db405ae71048ee999bb1bb91da84710cf387fc6478bd24278a1c33f9f35e93aef11c14e7d1050b3895660207db3ac13388b0ad893ad634b18b300f4131645747688b3e87baa73a9335525ab7451fdb21aef5e1cdf9f74a242ad16ddd05e90bfc595a2811575c2c3c18f05c911a00d9b5f9a9d9184ebba73a567879c333438e7bea5effa47a545fbc931e012bf9e5326f98a371c081ae8db62ccfc666e17d54a898f6de6ab8256d294032b00bf6e35e0b4e1eb2601f4fdef3b81cafc0dbfefdb190bfc6573147768f1bbf978ca272f3275872fff0862fd69dcd4101588c65020e1c096fcf19beebcf9a88f681c499466886a274d4a5c1a6ccd44e1613709630d6518fcc6164afc8c43de862e354b9b2ff12da9d0fdc47abd8639622503def658ac394f8843996abf10a3e85eb793246614f84b8f52acc41a950bcb9ca25b4a7b32cb0e34836921a0259870f4101dfa984aff245b99c03217a7687178719f2d1b42e505f9395d13cf4206d0069170baae0fc881f5c26e331ba863e1bdd2bf4a1e9bfd664441f24d482e6b5931fa6c412743dd66955d08ba4c46e3f14b2ba6b18b1ed498ef8c878bd8877ac2c8ac8341d8f80d75dd1f82b9d5847fac17c796ba18978893447e494c7f1d574b40a78cfffb586e0c72fda30e2dccf4c74bbe2ead963d0a112251419469b787e3231ca6ff62128749cd080c5e09eaa04090b20b31ad01b1c193cf3d0959cab5a724bec18dd03b6dffa8e1230bc16444597273a32d25a719076c8f13ab13e0a6be6b210beca874e0ea2d50f785a45f721e7ccafc5e3413ca8195ab4d767764b3e48d06c163166d45270035c23c5cadfaa4982637ba185c509d956018a9dbc2b3118f10c8bfec53c2ab5d750baf8c7115467f3c7abba9bfd1070f061311cc7208845f618ed2729996c5f9e1b53d65fb2f5f7c584fd0c7b007b5e24fd0a1ed917c9f659d1958dc7a7ce1688ef129de759e48a3274d33076e9a9e8b42d2568b548a48bdc7d53219b3251a182028ccf1e694e38e74e074bea148685418339ec75fbd0786ea015597206426193d3a1cf726b3fe514ae1e188e1706de55f5edee21d05a10ffee7ebf69efcd7c398bd1c44db95a1b4e49eaca6ec27c362cd688bfd7d5dcd139992d5a2acd7080fcf8c8d77e7f0bc3721813cde691beddbc94fb47f5cdeea2ac66f52e69e3b17dbe1b5ba43cc56252b8669ced83f6a1b4d5b324e703b2418e9d3c167ab45f6218b69dac6300534e8255e17215c25934aeee6efcab0305963fe0260d0c0a20b6069abca3db6d84da536babbfa054da7db4963035562fe7c237f8a42e82bb6d4634fa271f8494612e51104ca349bb170661ab592c07bd55594da13d1eb42dff09050e985fdfeef36482b7d01f3ce0719696c0a6d70eb5d4fd6edeac617c88c07edb55cc28fe5bb40f8333d9b9c746bb953a290c912a461f98caad48ccae996675d7d6809346361b92d7896b900737f2231461cd53c39ac16d65941d48a0504e89ab105cb8658e244a97b42473902accdf9595163e6350fcb23d8ee20f34f55a2d8e5e817599f2fad7f9c26081c64986fded708fb1f84f9638ad3fd1449fa363f030c6056f3a2c484a68c8d00e71eb44d62b09f04fea6d6b39009214abfa64d1fc0abe66c841a224ed62efa6094f49b23910bb72241a26abccaabf81dd2675a64b8111b9f50035d930459b7346b347c4479c3585c4dcb0c6791f5e9b4b6986e6cddeb16551f41811bc4d154cf8bab13e70fa6740b5270077395a9aa4f848d54cd135b2147c37c1abcbc3f3dcb8dc7c041fa2d960eb011525ab6955c866806e14d21d2a3ca978832ba9ca3f80794398424e2a05fbe9488fdaa76e54dc8c2c398993a517ed9c712ce9f955b39b6933b4d6d4cb2f4a492e605f9db838c97ee6976d2d736937e6b1ce90e2c6ebadfa9d4cfc3982844c70966a4c0bd7e7401feab6160236794254feb1a9b286f62a9bb262209a1c064fc4461008198302f62a393e5cc5d224d1c8ce6a792fac19a6e2918b22afb99fb9aebe0f90c69ac8e5d47332fa2ff82c161760df89fe85115c6f601c175b203435a1f8b37668ce81b1eefa13aaddfd3ae2e9c52ffe48cf01d0b10ec2bb95bb4cae1155faae519c74225902da67440ab70b1b22abdacaa4065a454c2353016766e86aac1e84e3c468215e734ac2381acaf9e480624376bcb6f912229875767d76574467cddd794b085d34a643a1485cc365dbd73cf35d5e3f73196c9ed020544ceffb52462a58d8021517f1f432b22a975748a5e26fe3d092f191c5a12ca7577ffa612cd1665a8f0fb85b9304c1d40f031792a7b2fc249442784757dcd92b6304cd05efc01f0e46a43fcaeb01eccbaa79beb4536b5aa0cda8758755051df15be9623519cb1db6bd8e28dad7ecb8b10d3b1553a0b9e78989fa49ab1df930e8a088dd0f66f718373d5655fc12c30d472226a370cd41fddf309e8f22da3fe9d5e7ee8acc573169ffdbe3acca15dfbfc6542215f0b47ae81140437e71a3b41478007ddb2642ce78858a26e380bbf36ed412205be8a0864fc97e38aed5a638915e6e9f8ed59546dc63d45701629809655327e3c84b5c78892b8e980018e6e4b39cb09c788cdb4f764ef70237bceeb96f05d268c926bdfe11ed4bb5baf193f613d58c8a83595dca8ed93999f971ffda744ad1942872e4587a319a0f89fcf3d652ecd90bed5f2182596b7871cfa481e16f7f4351a13f32d9ba74c2e10d737fc2d5b7fbf5c2ed15b30813d897265b1fc233915b92cf1304a9ade3a26b89c626d3253b355aababbdedc4be71c91a336134fc6761e3dddcc010a99e2e67f2075e325d294e72ebea81d55a81e127c9c8603605bcfab9b65837d060161881c53e55388e79650ed1d4ff454182da2517f2a49ee40ca517943c06cbccfd96e695439dd24e8f0848c1549c17ee1d4a3026a9e850168e9950885405938fab64a5090f25549f209fd6f51d460bc9269fb1f203f24e29be53bcb89a37b61a1b54514883df41bbd66bbad3754541e1d5556d142e3b562e2d9f856f03bca0414a8f32ab1b0a7550f2c029d88f40c2d1c639f744303f951fafaf3fe7c59c15dfb7aaec8b3b425101c3cb334df3855d319376d8f9ff67b274ff4f523d68cf8597d9a5c928ebfd4c698a1055f3fce46a043cf25bc61dcae8a8353f4ced525eba115901ea11710f3b60606b2ee8cc9ddf1fef426e31de084bfe08a20d263f56db75282957ae1ece7e2860a55ceecf2354871ea5405c9d2a0ee99cb47a61718de7cfca7c23d135ebd58684958326fb331e030954ece2a807aa1a71b6acb98f969af71fbbda5201e8d226fd7c231de0856f936b8f11701eeee51af343b4c6a9972e1d096a1e2395b706c72a3c2fe3fa68b03ba44237d203774e16cdf7c7a374fc940a5f0e0442ba66ccb49ccc2e5a044a980415a2909544256fc878d588743408c9ed605e390f2b15f331d04c27cbc2141263d6bae1a879f5b257d32c95590af1964b7d4831c98df57a870189d2ab9a325e5ed0729e3b28c571963b1e39c8d8545f9b9e4c7c57b9f41cd581412cac0ed4b7258acbd08f92527fbaa4b10c6d1ba55753e2d150e1b1a0de02f9fd65fa3bf25eef4ec050b3cee1010f83f27470f278d0382a8a2e06837150491ff660261f5f51a541949657326ae83ce767725fe60cdcbc317146f441db65d468e3a1973a65f11bd94685a3b337ee8e20b6337b54b1e685aced5450c6567d5e80011488c6efd9b0f72f8110c8339c136c41d06be9c635add28ad77b6fd6c6de1e16b91c408beab1558f34ad2a0a7d5b4eec55826098d94468bbaba0bb98c490684ecba6ba40d2f08d11503d02793eb1858d04c203782f2eb728026588bbb089c28e000b9e4bd26ca0ea5c5f05e323a72686f8d5683b73a8ee031eba459e15635664"]) [ 1281.071758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1281.077608][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x25870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1281.122684][ T553] BPF:Unsupported section found [ 1281.213416][ T594] BPF:No type found [ 1281.231757][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1281.231781][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1281.237549][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1281.321777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1281.328027][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1281.412643][ T791] loop3: p1 p2 p3 p4 [ 1281.433898][ T791] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1281.456067][ T791] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1281.631785][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:35:51 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000001900"}) 01:35:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@restrict={0x3, 0x0, 0x0, 0xb, 0x5}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x22, 0x0, 0x36}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='mountinfo\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x6, 0x100000000, 0x7}}, 0x30) 01:35:51 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xff600000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:51 executing program 0: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1f, 0x105000) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0xe0) socket$inet6(0xa, 0xc080c, 0x1f) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000100)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="00130000"], 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {0x0, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000010000000000000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:51 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x26870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1283.680498][ T913] BPF:[1] Invalid name_offset:3 [ 1283.693224][ T917] BPF:hdr_len not found [ 1283.721945][ T913] BPF:[1] Invalid name_offset:3 [ 1283.745347][ T910] loop3: p1 p2 p3 p4 [ 1283.753056][ T910] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1283.765772][ T910] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:51 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 01:35:51 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffe0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:51 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x27420000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1283.996209][ T1043] BPF:hdr_len not found 01:35:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='\'vboxnet0\x00', &(0x7f00000000c0)="0a18e88993d0d6ed4a746ca4d05c83fbabe1478fdf28bfad9cc5884d1c500a554eb06427a082dcf8155523562dc5a67433c2ab4f5b65c350bda688d7eb55b3a681fc596c42937bcb4cf0623755", 0x4d) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) sendto$netrom(r0, &(0x7f0000000480)="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", 0x1000, 0x24014, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) [ 1284.246910][ T1054] BPF:No type found [ 1284.262718][ T1049] loop3: p1 p2 p3 p4 [ 1284.277043][ T1049] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1284.336509][ T1049] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000035b00"}) 01:35:52 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1284.654389][ T1283] BPF:No type found [ 1285.791801][ C0] net_ratelimit: 23 callbacks suppressed [ 1285.791807][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1285.803316][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:35:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:54 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x27870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:54 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000ff00"}) 01:35:54 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs(&(0x7f00000002c0)='nfs\x00', &(0x7f0000000480)='./bus\x00', 0xfffffffffffffffe, 0x4, &(0x7f0000000980)=[{&(0x7f0000000780)="639c59c17a3b4563db3c663120f2489ae68c3dcbf345883beb5248eb33d1aa294fa761af231db153c5e974bc7252108f1140e6f6f106efa817b3a3cecd7ab2ae041771a946d44ba3ea4f6f45cb3eba2a55b36e8c69bf29d3a1ecc4e336440d6b672c6f63427f2ae2e4ed8b78f57b450c968939255f75a4cd61e96ab2411847748ba51ed9eaac99717cc15ebbf1d8f87612fd71b1086676921e92420228582ebece0f64d01f55734d1d3f81a02c83bde75706ffbc4134d55b962fda2bd3f24e41e5637efcd7b40be067f0936aa3e64ff5691cc2155fd74ed273654ad198b2182fe7", 0xe1, 0x7}, {&(0x7f0000000880)="18f297d83cc56a5e129ca17baadce50d22df4271d68eda60676f209bfe3842be71fe7b6212e855bc18b6b9461504551377946e928ac5038df591d58e5aa32e9a06d3edeff089e9f1f7cd54763cbf59b78b01d488a05d6f41ebb7841ef4cdfa1fd55906ba28b8b858119eb7d2fc8680f4b1092480ec408e68234eaf11a4800285abfb74ace912fe4502c2d8705e4827c620a880f175f3eb2f27bb1257c3a97b0c723d89e9a69b995d578e9f523925fdc57c5bcdf643f8b14fd5133f058768950e9faf794430ec7b5578847fd5", 0xcc, 0xd7c}, {&(0x7f00000004c0)="e8d19eb9cb38068d78febdf0486a350cd707fefb7b61cba02a01759bb5f81061d4d55065ff", 0x25, 0x4d3}, {&(0x7f0000000500)="e59c0f50745cabcb0fb68ea5736a48681e0d12128afb8f2c7565f241b8eb", 0x1e, 0x800}], 0x80, &(0x7f0000000540)='/dev/vcsu\x00') dup2(r0, r1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x88187104}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r4, 0x300, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x80000) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r7 = accept4$x25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x81800) sendto$x25(r7, &(0x7f00000000c0)="7c571630acce46e1e5ca403b02a6dffd2f955d223141a6779eaab705a77bdb22b3cf519403003dba31ed581fdc5a7aa0b0b2ce2b16c7bbd258a5837be7c499b266aed10ed8f8cd7ccaa7a3f72ce4cfd572fa9b39faa57b3f6a90a8ead376d19f5d4a", 0x62, 0xc040000, &(0x7f0000000140)={0x9, @null=' \x00'}, 0x12) 01:35:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000000)=""/249, 0x1a, 0xf9, 0x8}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) 01:35:54 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfffffffe, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:54 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000ffffffff00"}) [ 1286.765599][ T1511] BPF:No type found [ 1286.778131][ T1515] BPF:hdr_len not found [ 1286.783835][ T1511] BPF:No type found [ 1286.788988][ T1518] BPF:No type found [ 1286.794214][ T1504] loop3: p1 p2 p3 p4 [ 1286.807053][ T1504] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:35:54 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000000)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1286.855598][ T1504] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1286.911772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1286.917603][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:35:54 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000200"}) [ 1287.075057][ T1741] BPF:No type found 01:35:54 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='hfs\x00') clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:55 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = dup3(0xffffffffffffffff, r0, 0x40000) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x7f, 0x6, 0x1, 0x0, 0x0, 0x2, 0x7, 0x7, 0x3, 0x7, 0x9, 0x0, 0x4, 0x8, 0x24, 0x2, {0x8, 0x2}, 0x18, 0x1}}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDCTL_DSP_GETTRIGGER(r3, 0x80045010, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x3]}, 0x6) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000040)='\x00', 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffce, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0xfffffd9a) [ 1287.311779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1287.317608][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1287.352480][ T1873] BPF:No type found [ 1287.471767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1287.471805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1287.477591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1287.483332][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1287.532171][ T1881] loop3: p1 p2 p3 p4 [ 1287.571403][ T1881] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1287.585700][ T1881] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:35:57 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000300"}) 01:35:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) ptrace$setopts(0x4206, r0, 0x25e, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2080, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x80000001, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x400000) ioctl$SNDRV_PCM_IOCTL_DROP(r2, 0x4143, 0x0) 01:35:57 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x60ffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:35:57 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x28870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) syz_mount_image$hfs(&(0x7f0000000240)='\x1e\xc7\xfb=', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80052, &(0x7f0000000040)=ANY=[@ANYRESHEX=r2]) [ 1289.868700][ T2199] BPF:No type found [ 1289.904889][ T2209] BPF:hdr_len not found [ 1289.904978][ T2205] BPF:No type found [ 1289.917171][ T2205] BPF:No type found [ 1289.966444][ T2208] loop3: p1 p2 p3 p4 01:35:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="a9b06f33a7504eaa000000000000000000000000020000000000d9d68492fe426d880f1f9236e94a33eebfd2e614bfb588a21563990873f2ef04c1b33b9a08d1999406ba6cf6af606465fb48e5d064bf27dc723ce4392b9af48012965dba0071651582d65e79b8f8f405495b0ab86cf23c1bbdefcfede6c19fd9f6704d321c1b44da"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:35:57 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000400"}) [ 1290.005747][ T2208] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1290.042335][ T2208] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:35:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r3, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r3, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e21, 0x800, @remote, 0x7fffffff}}, [0x5, 0x5, 0x9, 0x9, 0x5a, 0x6, 0xffffffff80000000, 0x537, 0x2, 0x3172, 0x6, 0x1, 0xfe9, 0xffffffffffffff00]}, &(0x7f0000000140)=0x100) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000480)=""/171) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffd, 0x4, 0xfffffffffffffffe, 0x8, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x10001) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x0) connect$nfc_raw(r7, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x2}, 0x10) 01:35:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000500"}) 01:35:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x29870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:35:58 executing program 0: clone(0xa048300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="a1730100170000000069363ccd8a060a090000000000000000004b27bb6ea56444ce1a24452c650f53bc4c3847aef80df12c538550560d22b9d5f77570947557f8be8a48ad7c49f347182cd9a0e8391ccfb6288c8ae849751b1dcb2ba65db948ead3b5"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = perf_event_open(&(0x7f0000000700)={0x6, 0xffffff50, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000, 0x8000}, 0x2, 0x0, 0x0, 0x0, 0x2, 0x101, 0x800}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x802, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x9) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2900000004000000000000000000002002000000000000000100000000000000010000001000000000e9dca966d0ef6431d40f8130d8909230"], 0x29) dup2(0xffffffffffffffff, r0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000480)={0x2, [[0x81, 0x0, 0x7, 0x1, 0x1ff, 0x8b3, 0x2, 0x6], [0xdbf3, 0x7f, 0x4000, 0x67c3e20c, 0x5, 0x2, 0x5, 0x1020], [0x6, 0x0, 0x100, 0x5, 0x2, 0x4, 0x6b, 0x9]], [], [{0x0, 0x400, 0x0, 0x0, 0x1}, {0xffffffff, 0x0, 0x0, 0x1, 0x1}, {0x1, 0xff, 0x0, 0x0, 0x1, 0x1}, {0x4, 0xffff, 0x1}, {0x4, 0x20, 0x1, 0x0, 0x0, 0x1}, {0x11, 0xfff, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x9f91, 0x0, 0x0, 0x1}, {0x8, 0x7, 0x0, 0x1, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x4, 0x7862, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x6}, {0x3, 0x2, 0x0, 0x1}], [], 0xfff}) [ 1290.549748][ T2447] BPF:Invalid magic [ 1290.681842][ T2452] loop3: p1 p2 p3 p4 [ 1290.702185][ T2452] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1290.726718][ T2452] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1290.741646][ T2618] BPF:btf_header not found [ 1291.071776][ C1] net_ratelimit: 15 callbacks suppressed [ 1291.071783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.083446][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.471789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.477574][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.631770][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.631824][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.637562][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.643270][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1291.711788][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1291.717586][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:00 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000600"}) 01:36:00 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) socket$isdn_base(0x22, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000080)=0x3fffffff, 0x2) 01:36:00 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0x4, 0x81}, 0x2) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x680800, &(0x7f0000000000)=ANY=[@ANYRES16]) 01:36:00 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x1000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:00 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2a870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1292.918507][ T2693] BPF:No type found 01:36:00 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x48145) write$rfkill(r0, &(0x7f0000000040)={0x0, 0x5, 0x3, 0x0, 0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1292.966004][ T2700] BPF:hdr_len not found [ 1292.967793][ T2806] BPF:No type found 01:36:00 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\a\x00'}) [ 1293.042574][ T2755] loop3: p1 p2 p3 p4 [ 1293.060644][ T2755] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1293.131887][ T2755] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\b\x00'}) [ 1293.236784][ T2929] BPF:No type found 01:36:01 executing program 0: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:01 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x1c000) ioctl$NBD_DO_IT(r0, 0xab03) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f00000000c0)=""/67) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x13) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) mmap$snddsp_status(&(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x0, 0x100010, r3, 0x82000000) 01:36:01 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2b870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1293.610941][ T3158] BPF:No type found [ 1293.662643][ T3123] loop3: p1 p2 p3 p4 [ 1293.678840][ T3123] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1293.724046][ T3123] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1293.922654][ T3123] loop3: p1 p2 p3 p4 [ 1293.927563][ T3123] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1293.935633][ T3123] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:03 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\t\x00'}) 01:36:03 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe3, 0xfff}, 0x20660}, r1, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x202, 0x0, 0x1000, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x3, 0x201, 0x4b, 0x1, r3}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:36:03 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xfe76}, {0x0, [0x5f, 0x61, 0x0, 0x6f, 0x0]}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:03 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x100000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:03 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2c010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1296.011088][ T3451] BPF:hdr_len not found [ 1296.016605][ T3448] BPF:Total section length too long 01:36:03 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000001900"}) [ 1296.083429][ T3447] loop3: p1 p2 p3 p4 [ 1296.088422][ T3447] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1296.106745][ T3447] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="18c8089feb010018000000000000000000000002000000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1296.191787][ C0] net_ratelimit: 23 callbacks suppressed [ 1296.191797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1296.203252][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:36:04 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2c870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1296.405154][ T3570] BPF:btf_header not found [ 1296.444844][ T3570] BPF:btf_header not found 01:36:04 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000300"}) 01:36:04 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) sched_getattr(r0, &(0x7f0000000040)={0x38}, 0x38, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x128e5ce180659501, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x2c, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @empty, 0xfe}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r3, 0x6}, &(0x7f00000001c0)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0100ff000000603a8174df9d2f256b000000294d88f1d06984c89494bc592ad13c040000000000020000090000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1296.693778][ T3586] BPF:btf_header not found [ 1296.712552][ T3581] loop3: p1 p2 p3 p4 [ 1296.731132][ T3581] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:04 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000005b0300"}) [ 1296.742776][ T3586] BPF:btf_header not found [ 1296.753671][ T3581] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1297.311827][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.317601][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.711779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.717621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.871788][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.871823][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.877582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.883322][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fanotify_init(0x20, 0x400) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$setown(r0, 0x8, r3) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000040)={0x5, [0x8, 0xfffffff9], 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="97eb01009d40be426e1800000000000000000000000000000002"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) pause() 01:36:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:06 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2d870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:06 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000500"}) 01:36:06 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x200000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:06 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x30000, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)={0x10001, 0x10000}, 0xc) write$dsp(r0, &(0x7f0000000080)="ec74edc191c8279e3113466a0b66876f340204cd19c6a4fbec8a19a1580508236e5fb26b503c8382382895dd342bd07ac2769fac1ef588b099839ca3fd24b203e89397d61ce704acdf1075c2724d042448c1b8e1c4dac938430a1d3824be706229fcccd6a6b1f3bbacc84025a29e8063d0702e7210e6a05f6cd82754fb343ed3ac132ac296d8657fb00890b948a0d2263c43db2537109cb927078a9c4785f2dafb6db3764074e30c4882cdee8e97996065d2e92dfce2309be3e22d3c8097abdcb8dbda75bd0a55399b9073855f029c708532853806b40b8e91cc28f4bbf514521d550371f217bb6201c50d406639", 0xee) socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f00000002c0)=0x200) [ 1299.124714][ T3827] BPF:No type found [ 1299.126008][ T3824] BPF:hdr_len not found [ 1299.196753][ T3826] loop3: p1 p2 p3 p4 01:36:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000600"}) [ 1299.228112][ T3826] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1299.290831][ T3826] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) getpgid(r4) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=r3, @ANYRESOCT=r4, @ANYRES16, @ANYRESHEX=r3, @ANYBLOB="5babc6ba337201581b7a3119499a18f475fd07973cca70ed8f9df310d9b79ba72f2060ea7bc68072c3041ca90efa47e8ae2299a42284c59c7598a968976af7dbc54c9672cb2d48c85dc27efaf0", @ANYRES64=0x0], 0x2da) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r5) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) [ 1299.430104][ T4045] BPF:No type found 01:36:07 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffffffffb8, 0x2, [@struct={0x800f, 0x333, 0x0, 0x4, 0x1, 0x5, [{0x4, 0x4, 0x100}, {0x10, 0x0, 0x5}, {0x7, 0x1, 0x6}, {0x10, 0x1, 0x80}, {0x10, 0x4, 0xffffb12f}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0xffff}}, @enum={0x800013, 0x0, 0x0, 0x6, 0x4, [{0x10008, 0x7fffffff}, {0xe, 0xfffffff7}, {0xa, 0x80}, {0xd}]}, @const={0x8}]}}, &(0x7f0000000380)=""/246, 0x8b9dd1e6400dc389, 0xf9, 0x8}, 0xee70) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:07 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2e020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\a\x00'}) 01:36:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1299.882512][ T4163] loop3: p1 p2 p3 p4 [ 1299.887427][ T4163] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1299.928572][ T4163] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1299.946314][ T4199] BPF:No type found [ 1299.959404][ T4199] BPF:No type found [ 1301.471802][ C1] net_ratelimit: 16 callbacks suppressed [ 1301.477548][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1301.483304][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1301.881934][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1301.887703][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1302.031770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1302.031787][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1302.037677][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:36:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:36:09 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2e420000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:09 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x300000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:09 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000001900"}) 01:36:09 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x204000, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RAUTH(r0, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x68, 0x1, 0x5}}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1302.111789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1302.117569][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1302.191600][ T4391] BPF:No type found 01:36:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1302.223327][ T4391] BPF:No type found [ 1302.242033][ T4397] BPF:hdr_len not found [ 1302.253633][ T4403] BPF:No type found [ 1302.275341][ T4396] loop3: p1 p2 p3 p4 [ 1302.280485][ T4396] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00?\x00'}) [ 1302.338396][ T4396] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x9, 0x1046200, 0x20, 0xb5, 0x7fff, 0xfffffff8}}, 0x50) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0xf6, 0x0, [0xd6, 0xff, 0x4, 0x6]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1302.431809][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:36:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:10 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2e870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1302.569623][ T4420] BPF:No type found 01:36:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00@\x00'}) 01:36:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000010000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x44) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x0, 0x5, 0x0, 0x8, 0x0, 0x100, {r2, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0x3}}, 0x5, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r2, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={r2, @in={{0x2, 0x4e20, @rand_addr=0x1ff}}}, &(0x7f0000000100)=0x84) [ 1302.846834][ T4533] loop3: p1 p2 p3 p4 [ 1302.877025][ T4533] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1302.959985][ T4533] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1303.067730][ T4665] BPF:Total section length too long 01:36:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000035b00"}) 01:36:11 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2f420000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:11 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x400000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:11 executing program 2: clone(0x48a14100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x1, [@int={0x7, 0x0, 0x0, 0x1, 0x0, 0x75, 0x0, 0x6c, 0xd}, @struct={0x1, 0x3, 0x0, 0x4, 0x0, 0x1000200, [{0xe, 0x2, 0x8921}, {0x1, 0x2}, {0x7, 0x1, 0x6}]}]}}, &(0x7f0000000380)=""/249, 0x5a, 0xf9, 0x8}, 0x20) 01:36:11 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='[:\x00', r0) [ 1303.337994][ T4858] BPF:hdr_len not found 01:36:11 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000ff00"}) [ 1303.497513][ T4868] BPF:Unsupported section found [ 1303.502918][ T4863] loop3: p1 p2 p3 p4 [ 1303.544189][ T4863] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1303.573180][ T4870] BPF:No type found 01:36:11 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000200"}) [ 1303.602100][ T4863] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) 01:36:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:13 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x2f870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:13 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xa20000, 0x40, 0xffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0xa00966, 0x8, [], @value64=0x12}}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000140)={0x0, 0x1ff, 0x5, 0x5, 0x2, "a56a7be503e4e5cf4d932c412060fdfa23dd58"}) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000080)={0x100, 0x8be, @name="a08dec4592d1d081e43a28fe728d2f2c48b8b0c5c3af0b8543f0c381ba4f4d37"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000000000c7cf185d00020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:13 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000100"}) 01:36:13 executing program 2: ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'ip6erspan0\x00'}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000380)="f00fc74f94ba4000b87700ef83d0bb263e050c00bad00466b86b00000066ef0f005c8e0fe82d66b98b0800000f320f013fbad10466b80000000066ef", 0x3c}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:36:13 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x500000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1305.726707][ T5210] BPF:hdr_len not found [ 1305.785314][ T5213] BPF:Total section length too long [ 1305.802982][ T5215] loop3: p1 p2 p3 p4 [ 1305.814277][ T5215] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1305.847499][ T5215] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:13 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000200"}) 01:36:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, 0x0) 01:36:13 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x30020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1306.335727][ T5339] loop3: p1 p2 p3 p4 [ 1306.351317][ T5339] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1306.359664][ T5339] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:14 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000300"}) 01:36:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:14 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x30870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1306.601770][ C0] net_ratelimit: 22 callbacks suppressed [ 1306.601779][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1306.613252][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1306.792568][ T5663] loop3: p1 p2 p3 p4 [ 1306.797491][ T5663] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1306.852276][ T5663] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1307.711776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1307.717556][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1308.111782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1308.117589][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1308.271785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1308.271827][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1308.277573][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1308.283301][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:16 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x600000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:16 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x6, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1, 0x2}, {0x9, 0x2}, {0xd}, {0xb, 0x4}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x5}, @func={0x9, 0x0, 0x0, 0xc, 0x2}, @union={0x10, 0x4, 0x0, 0x5, 0x1, 0x1ff, [{0xe, 0x5, 0x1}, {0xf, 0x0, 0x18c7}, {0x5, 0x4, 0x8ba6}, {0x7, 0x4, 0x1000}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x5}}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x2c, 0x0, 0x7c}]}, {0x0, [0xe5217f1337e1e5ef, 0x5f, 0x2e, 0x30]}}, &(0x7f0000000380)=""/249, 0xd2, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000400"}) 01:36:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:16 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x31870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000000)) [ 1308.871370][ T5789] BPF:[1] FUNC _.0 [ 1308.872475][ T5792] BPF:hdr_len not found [ 1308.897925][ T5789] BPF:type_id=5 [ 1308.916996][ T5788] loop3: p1 p2 p3 p4 01:36:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000500"}) [ 1308.922449][ T5788] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1308.969462][ T5789] BPF: [ 1308.976027][ T5788] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1309.006950][ T5789] BPF:Invalid name 01:36:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000000)) [ 1309.038634][ T5789] BPF: [ 1309.038634][ T5789] 01:36:16 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="9fd0010018000000000000f4ffffffffffffffffffffff00080027f2a7947e975398b69f2a578f6f929d260279ad009c8f3f0d2c6d9232c0f1cc0c298002777af24d895df712e3fed5e686138adc97289dae804c1e697144cee186cdbbb6669034439b96259c54bed8dd2eef20f0720729acc0a843a3693b1b0a4119d72c4f50e98afe1c577dbe65c21c90f28f84dd923d488ed622df03c57abe73cba4ae900d2086a984f0da09e1ce888cde0a9733ebce5763a0b31dfeab16751109dcf1c31f"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x3ff, 0x5, 0x0, 0x8, 0x0, 0x100, {r2, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x13}, 0x5}}, 0x2, 0xdb16, 0x7, 0x0, 0xfb3}}, &(0x7f0000000000)=0xb0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000002c0)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r2, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x2, 0x5, 0x7, 0xff}, &(0x7f0000000640)=0x98) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r2}, 0x8) 01:36:17 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000600"}) [ 1309.315294][ T5917] BPF:Invalid magic 01:36:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:19 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x32870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:19 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:36:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:19 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, [@var={0xc, 0x0, 0x0, 0xe, 0x1}, @enum={0x6, 0x0, 0x0, 0x6, 0x4, [{0x4, 0x10000}, {0xc}, {0xe, 0x2}, {0x6, 0x7}, {0xf, 0x8}, {0xf, 0x2}]}]}}, &(0x7f0000000380)=""/249, 0x1a, 0x45f, 0x8}, 0x1d) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000340)=0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r4}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000600)=[{&(0x7f0000000200)="57db9cc32b44dc80b4f5bb59c1d203f72700056cc4131c939c3c17c1cbf3bb", 0x1f, 0x101}, {&(0x7f0000000480)="3f1f675130c8b34eab2afa692f42e0272ede140c80202e171325ac93899074f3ce4bc105ad32147cc2a04aca256967c492cc4638672a08bf358e79186d7cac84a303283641a2c48de033399be013ce12dbeba68ce166776752530face485072abcb3187f5d47e307cb98f8507534fbcd606ce4cce1bcd000404abde16a9b060a78871e527ee46fe681635a9416120e6f7ead993be20c5a807bc409c41b150226a60b9cf5e82b370342e2e69aab95efc562cf092c27fa3285607d21192c5d07e912d9241380fcd8e8d52481eee4af896d52298424227aa80b4bb8e7f7281fcd96ba206561f1dcba72ec1291035360887817da910f18", 0xf5, 0x6}, {&(0x7f0000000580)="73edc0dd3bdfdf80fce6fefc1e6846f13ef87ff412969d25b7f3e444413aafd8fc6c8b6efe51bd17d1fbdea2e2b7d33ca1aa161d78bf25cae679baa15bcc377db5f4c1cb6545ea44e37da019c811803d37f06fe01cf756f50664012f36d2ad4ec6d8d10b07df3fa7335cdce150f1a07f814c146e75af39", 0x77, 0x80}], 0x44040, &(0x7f0000000680)={[{@creator={'creator', 0x3d, "0f74ac67"}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', r3}}, {@uid_lt={'uid<', r4}}]}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 01:36:19 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x700000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1311.871766][ C1] net_ratelimit: 16 callbacks suppressed [ 1311.871776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1311.883278][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1311.964206][ T6141] BPF:hdr_len not found 01:36:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) [ 1311.989498][ T6145] BPF:Invalid string section 01:36:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000000)) [ 1312.072546][ T6147] loop3: p1 p2 p3 p4 [ 1312.090375][ T6147] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1312.102375][ T6147] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:19 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 01:36:20 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:20 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1312.281763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1312.287552][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:20 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000040)='\x81\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xfffffffffffffe12) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000100)={0x9823, 0xb, 0x4, 0x10000, 0x8001, {r1, r2/1000+30000}, {0x3, 0xa, 0x7, 0xc1, 0x0, 0x8, "96830798"}, 0x5, 0x1, @userptr=0xc45c, 0xfffff801, 0x0, r3}) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) [ 1312.431761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1312.431798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1312.437604][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1312.443279][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1312.511757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1312.517570][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1312.640195][ T6274] BPF:No type found 01:36:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:22 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) 01:36:22 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x33870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:22 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb7bf4442098046a2b0000200000ff010000000200000000009a4d2c7cf4ab5cae537eab2957718135ca1eb95e86a50817e31046f9a1163885ecd2c839e3749a3fcbd6bf2044ffa6e66114f4bbe8d11a5ba458701e5e61ce72314e64434fd3c46958054f5a15895361bdaf59fb02277c2ab2fa759e8310f5"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0]) 01:36:22 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000001900"}) 01:36:22 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x2000000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:22 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000000)) [ 1315.019599][ T6493] BPF:hdr_len not found [ 1315.036097][ T6495] BPF:btf_header not found [ 1315.125642][ T6495] hfs: unable to parse mount options [ 1315.145328][ T6496] loop3: p1 p2 p3 p4 [ 1315.150534][ T6496] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1315.185202][ T6496] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1315.194307][ T6495] BPF:btf_header not found 01:36:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 01:36:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000000)) 01:36:23 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01fb153bf320aeef71c7fbe799bd01000000000000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:23 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x34870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000000)) [ 1315.582719][ T6628] BPF:btf_header not found [ 1315.652523][ T6630] loop3: p1 p2 p3 p4 [ 1315.661203][ T6630] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1315.691955][ T6630] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1316.991785][ C0] net_ratelimit: 23 callbacks suppressed [ 1316.991791][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1317.003187][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:36:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:36:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000000)) 01:36:25 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x35870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:25 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x7e00000000000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:25 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000000020000004a77"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1318.111761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.116611][ T6856] BPF:hdr_len not found [ 1318.117551][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:25 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000035b00"}) [ 1318.190711][ T6865] BPF:Invalid string section [ 1318.214232][ T6859] loop3: p1 p2 p3 p4 [ 1318.248639][ T6859] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) [ 1318.312976][ T6859] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) [ 1318.511761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.517584][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000ff00"}) [ 1318.671765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.671783][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1318.677531][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1318.751773][ C1] protocol 88fb is buggy, dev hsr_slave_0 01:36:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) 01:36:26 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x36870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1319.043487][ T7036] loop3: p1 p2 p3 p4 [ 1319.055756][ T7036] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1319.078799][ T7036] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:28 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000200"}) 01:36:28 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @dev}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @dev}, 0x10) 01:36:28 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xe0ffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:28 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r1}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) getpgid(r5) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x01', &(0x7f0000000040)='./bus\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESDEC=r2, @ANYRES32=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32, @ANYRES16, @ANYPTR64, @ANYPTR, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64=r3, @ANYRES16=0x0], @ANYRESHEX=r5]]) 01:36:28 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x37870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1321.176681][ T7119] BPF:hdr_len not found [ 1321.219190][ T7123] BPF:No type found [ 1321.294384][ T7121] loop3: p1 p2 p3 p4 01:36:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000100"}) [ 1321.315437][ T7121] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1321.345356][ T7121] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:29 executing program 2: r0 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) 01:36:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1321.555609][ T7123] BPF:No type found 01:36:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 01:36:29 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x38870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000800)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 01:36:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 01:36:29 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x5, &(0x7f00000002c0)=[{&(0x7f00000000c0)="94acbdec7e3d054963e8df2ad1d4180be46f7e42525dcffa9c92e42434796bea20bab102c0b08454cfa6dd1fac4677d9bbd5ca1d1db01ff2e908f4cca5f7631bc6f8c22d36ae9a7e80dc25c718801240a9da5500d89fa67aea59bfd2c09ee0fd", 0x60, 0x3}, {&(0x7f0000000480)="206ca395cc8ffc9fb8368feaa4524811ea027b65240043d16944492ce10abec6dae58a2e8fc3b0f1142ab5c548e1730047268ab1c891d6b9fa8ba431a85d1aae8cbc75b46c58d5eced7037faf66872b96ea7a6cf79432029ec61e979930f35f108ae3b83bb33ce840b75202f9258ab0e0d3df93fa5d81bfc28ecb0cee36a52ae168be7b408ffc652755ef960e09f42068bf5a3ab05f8b65eb8f3c4621dad24437dfc3b3e807ba65d4dc28c755b146088dbf3fc85ecd49e2a01030a6e04b13df711eb4452bfcfc8cacfeea78ef4cc5a98877675c6e3c622c431737734ad5439bd55bc7526cf8ee1392aab172643a930061654e2baaecb6c1ff41d930febdcdd613b655949f6672bb89b145c72cff6b06190d2f2c9ab547034caef76a5566c190422eac39e322d771aeb016835b117c8a1aaa707a0c7e3d99f709872ae8981c3f07af3e915ce97092e87ea53e21e55a00a0a3877046e65307bf8da26c6c28082874a7dd072eab435eaae7d1205cc57fed3bd2823c5dc8c6ca5a527b8f70344fe1ff4ed4699d2a6a0eea93a3df0247ad903807df41f0403c167fa8c59a373a3a6cd3fc8bd6f57dd54ef1ff5b59ad7cbec6b07dfaf3afe5483c4992c2943e5083f55b3544fe3ecef044bc99f2b1de0770da0b1a1ae4900e3f2a0e82147dbb6c1110dec0f4a6b8045659e00de5cc6349ce319b0420b5a88ddcb41ced76804a481ae7969ff330d8b83e37804639bd56249acd8fecd4a7e7d70d315d856c55e33807b053136af1275f2cc49f09fb993c3068c0bee2bdf90442a9192e0e4c4956b60b1462186cdcfb947f519494bee728729273ddad3b2bbd56c7806212fbf60411673c177aece43946a04e8b287c4ca180b916c8ac5e3f5732d859e2ef7a9f3108a1dd8b84856b2898c7e80cf5aec00d8764445457f9e0f2ba95f9a7a4d6ce64d3e2866c0f6316177d9f0afd83186500ce55d1574e59837b278064051086e49aa0dbcf51a42626b6dccd88f3ab95cbb9c91164c93ac93f4bb08eb2c37796d0f873226242c9856b748c63668ffe282277bf8c89c028fba506437a31d92c5417a7358df6015ec808bd62e3a19045a4cc41805098a6d65841fe229aee47b0fd2a0879f40bec342200a4d463ba20480e4ba2b8e18037ca6fd93d897b6fdbd68d466e8fcc3e1c76451af1e2664bb3ef80a073f9c66c89a03417c9a2667e936dc5bda4f648b62a3341ca9230025131a7ea28f57f278039369777998049fcfd8292d1a373210b4574e641622ea4871a0962c5b0bd82cc780c0e81e95622cee18420976829b67be382f946ca734d7e785cd2f8a3bee49339f37fa9fc6a855e989fef849d08f6da792455883ebe863b5be630d3ba0a8e0791d3d083ff7d9727eb7f3b15f009ab00b3ada46669b5cf79566756992896136a7a120b75aba0a2e30f45986f5cb21c60765c0ff122db927c3124760184560c4e73fc5267fe059f3d4452d9e32cc585abcdebc48700fe6747784a72cb2189440f25f728b20ee40e724c44c5c9b7b3c9b0412c7127dd83d35b7db1a2e0803cc157424d3bfda8dea683393a6fcae89ee15cfc7ce11ccff7d9e6b4dd2b2be23fb3c8930edb29a19f716fd69e0dcd510d3f8a93a437bed6c644e906e91bdf021c33dffe037dea941b37d2855642c98bbbd1f4d4e4d8fa1658b7c753a07b4909faad94192ebea69d9203bf917442e71a1aeafc0e16d7b8e0acb9107704ec9115562fbf86c763acbb1718792ad68571ec6bd8198c174f091cb755942d8a3f38ad645e0f68ad8ea720ffbf671e2d25bb7d1b1c8f69dd2822f34abb906617aa993db28363aecfef7b18b34fa78cb81910a250155de2aa230934bb9e82e8ea1e93ac3e3a5ee6972b00479fa12acf1f1b6b3e53eb86c8ab629d4e724a8e6064773d79443d99e94cd1776b57c5ac77c1d94a260e32d2b60a55f9508c8036c8ddf6b15b3927882354ceef3f5ad621a7a1f73395d63b900cb50f800e154991b7e4e9a086328d6744f37d6548522620cf843f8a6ede5a5056331e6fccfa56fbb205f6c6b342285ba508fc92ac8cc75b35195e104f52a0d7d76af940e6aff335577b9d4866419b1432a59e71393a99a69309d69014365175346d18c5cb5f9e22728dac362f6f2850158aa9286f4f7647284e11a75253d0418251f4592a6e7e27b3e125d96a61be4672d977248d7899443055ac47a2249cfc9804581e39aeee9b8dcd9bc32b3067b731c32e1286dbe37a0214001ead473efdfc8afd84c60709079215b843f151be65a8d4210e4de16549d3f8d3d3ff85a4a3f5e94e0452fdc3f6c0fdc35da0224ca6df087243feffc9c499a2b11376d0e4f573f7dbdfdda6a24e6c1a6d28bce9e5519725771e641c8785e67daea1644ff2de93b62b5af91bbd93e27274bfc720259cad8220b73e737d802621c0ef5594af14d88625bc9a86638c386045304ff32b43e6b284aad0581fc9d36548fe4595cc2ec86a6475378e23a09fbee8e8ac58064f78a257acd103222388c54727e20163fd34fe84cf812706d9e793972ba20ff7f960310891fb2e2e0f9c06d84fe4456dbc6d5a9267c1369910591cf6b19dc1e423c3fba1132552180962033f782ef359e3de70dc3ad9ec7000f4314cad82fb56979b7b322e84757e1724c7d1255f1dd12832d0f71448f981cb618e82119682f95373d56466c792a550aeda1e75bdc5803f410201b70f8d82a2bea8466d51b12fcb8c9f08136f8ed1615d8775ab8ca870ae0cf9c2c590beaaf7fa5dbb17e5a1e9dc2b753d86b2bec83565bbbc9abdfa02eba7037b8143beaa466e2cd31c288d1cd269a765551770b80b2e3f93eb168b8327f8f63292b029f9c7aebd15cf30d2fd012235dfacc76daee324cf4947b6f6b85c828712249737fee4298f8c0a7a0a6d09062191314c58723bf335a3d67e52d7cf546981ef31ee53857b394f3e818f6990620bdbcba26aed2c2a3fad0ae7ef372890dcc17c72c3749a970e396ee747436f7e77a93b7a5023985f15e8aef1634cd8f99fd45c9cf29d31f85a913b970d645401b9f5749ce23dc2210dc62436238f8157dbf39e05b63e231e3aad39b6257cb1f27f249882f2f784c6bec6e3a480bf1c568a23ce2a6886638705db76fd3b0e19822df800b705f87ee0ce21aaad8a55dfc56979808476b5892339196ccd0aa0d1e419576a711d8333f92f4059fd0d8290da4577430bb9bf24259b5840c4fbed2a5d701496af47bfd0355d5e8a1f23a190c74d90c8c875018155997f0067ec9355eeb34e509814c81505fa6ee19f292f359f2bde2bb7bfd4aaac3875f3c99996be71e904624751b836eac42784c45dbe31fad6810349d60b7ceb03185952ee3ebfcae879a27fa4e70d5fee362b704b44886e03372a62812a1b3be6318abef95cbd1a0221cf8abb023938d0aa8580f4c9d1ae9421c6bb25f286df27bf53f62a57438d08ef18e01dbfa0365db2cc3d00195b32ceb9fe7502f3fbc6035c59ef0b285a9798b8a833a87fbb2b583b3a94ce5340ea794240fa38c169fd72dfb82d96edd9b539c0312339c7646341aed7224d49f1d3f5d066f7f3b041ec3f8c921b1cd91f2fd268e6c1dd1b1cabab36d4e935a9ea141035a5455a4faa3de065442bf90fdd05f4d4438780aa673d12343cfa6ac84a695a34921f426b2641d916876ebbfb98dd0480e59c7fcaf2ea30138c7f5cc18fa4a47bc48c311966e400836857c15ed077ca834870f8b9304c244acf400b4ac136ed0d10ea6e89108cdbe8a035dd544aa9ff348372d4cd1d50efbcbfdd86b8b116abe153bdee308d72880f3c14fa853bed7a5fd421a8521cc68c2297433d42e8205e7561ec64b856be7fcc9a13807f87c2dc0a244ea8ab4301aeb25dbd3bd421ea6be545aad0da7805cc93c248091254faeffdef2337faf277b3a715ebad2835a5a8d7d5e7615ce59f007b54fcaeff3c60f88e5359ef7876f0b3233122ca393fa95390834f4830a2228722341ff75f2c181c20ecab4dc920786f9b02ce81d8d5468f8568ca3d19dda0568ef1479b4cac53b0c4b5afa286544582330394f14cc5de54478caf5b93e09e3280e8885c872f0fb94b2b1c3c015eb4428a929c0952262e08934bcd727a1ed9bb24b2bbd3612974853da525a2838f1aebcd87d96502f366882aec33478f6955c6d3864964452a9a1b0e28a566151b419a1cd389c32c80126e8da9aa2d254d1fdee5858581ed1dc0a9f0f506c3720844e49b3cd55808dd8b0a066cb578b3d7394329614709e8fe240c3b6ff0bd0a1358b05224c711eac0e92ca6b91515ceda1a27179d3032f0b53e94b1b7f3a701833341dca86505fa220b1ae703564ddb3e8a5d0d023c5b14c0c851fbc43bcef36bfa6db1b6f2733839a56a5d2b157cb7b6935817c899bc5b8e0f16b0b89281918d1f4f2da13e818d10a23417bca96fe46283c2144e206e007ca8473b0959ca783f8bd5177a2e22469b4f356e90755bd64f3f1986b69b9be6682b025c1adc77e9b7310df82f1d741dca83b9275ce780c8c56821733c43c4fdeff7e77dc75c0e4a6999794352e31af3f9df15df8a69cecd092bc50274a4e8a3a45a95a6fe92635d61616aae2590d04323faddbadb638fd3fee43d94d10a3992b2cccf8d7941728604c6e5f306f80fcaff9a156fe94e213a7c9b57ec671f4c4dc84b48f0c851773285664cce6ada732b1103b3f6ae2cac0db002ffebf028d49dcd0e154f35ac0190ecdd4caaba3e007cff2cad97a6a5064709389e3ff9c014d8332993498053107f2f7a3a6e0365c1e1f126d6eca819ff77309d9aa41a503dcdfe19308761ac21e6d525a6f33708599da9c038ca8a519a6caac6ae0937617d5e5ea7601219ee4e7c5eaeda1c553864713ce7a07b1647f6458a0dbfff4fca6a20718b486ed6ff6dd51e57ab35082d909adc444f741d22ffeee8ac1a51cbaf6a39f3b32a30ebc67b1d714ba6679e7df70ed1acede174711c82272c961d5a0901f9c7b93872e08df71eeedaa1c56e361d2d093af7bbc0c0d0ebdbdbaa7c4c6b3d3a551a984e054f634c7c16a83b763a4bcc5026c8f29af586b452644bd253ecc790fbcb04a90d619ea442a49e2cb15831a228c7048204ae5fd8ca3006bdf1c4270ea0fb581d8853bf199fb98ab2f70baae5c15fc05c6ea621fa995691d7ae4666772095e89ed05f2b82aa827a3319204a6fd9190033edbf8760713222b93f921d1a55fbcc0cf65944f6670878650bbaa9b6f3c9048b379696051fa6c692b60183f2704398690d97e97364d93b613dc1577ad2b593051846d3d068e06be965662e1d33137f58cdd79b3f7abdc3947ffde605792921bab647acba5c9ad25d033a646f39d3f8f8cdec5ad3b33524c53ade26cc7d70e0856a7156bc87104dde093333fd24f0b8bf07cf1b4a85451efd6f576f37096aea22a7d40c6c6841291cd05edde016f5ddc7950e52e825bd027163242ffb8bc985e00c8d458d9870497f36fafae47ee8548dd3773464afb0230da6018f16a8b65b316bb99e3bb4f7a5f1d2334963211a5088bdd5d8a750d624fcb22161878ad48c86cb8c5ceb85aa6e6a6bedbe076dee5835dfef40743dbdececf7300f0c47039372a20ca05e3ef54862251082dcd0970284ee5805b57f4a14c9f887f38519473040730d0f1a00ff8d45b16b9f5584034cf4b14a3db8f61fe3a2e1cef3d7dd7bee09aa583445f628b70af5fd4c44bcd94b3b98f4b3fb5926a7379577ab9146ea4f0f40b431e4e17334649f950ea857c5efb774d85675042255460ba9ce00317", 0x1000}, {&(0x7f0000000140)="6afa6ea9cd98152ea33abd5e912e18da81eb8b79ad76daf9cf4d74238a1808a04cbca6c8a652de7a4b44c666df3ac34683a45a7a54427f42f6694155ea4630", 0x3f, 0x7}, {&(0x7f00000001c0)="be42130f46080cef60a526d231c3c1e0fa989fa0cfb8e348a2b1baca878d979b25d428f8d89e85a20af8023d72fb2ad8fd6ce6", 0x33, 0x3f}, {&(0x7f0000001480)="bdea11e4ea007af211bc651263017c9a83f6dd006443c90e3713b0042af1c1121b3105eff141b01d6009f9e8fb99c7b329665fbcb686e84372aa448aaaeeb18d913350ed959d3a978e452ff5e9b5e6e9db2b59fb4300db16482d23ef9c3a21fb96d49196a1be4ef435ca72a27a6be1cd46235e71fd15deadb080e58a8cf55700bcabc39c70113b0dd32ad7d3728b1ca3426e882df0a8c0bee621d85cd4e188a7bbbf20f36978385fd953e938543bf3981054ab1319b689549b6e7c4b02354b6185eeae9314cf4d825abe479fee8555f379bc6d81a455f1b63ac348d2b6e5b7b79f37b0a0e269f67b1a1f9d12cafe81e2e1bad09654e26c87f9a173de7b92fd9930e1aad820ecf22f043d418a467cac75211d03034e76652d09cc5548cdb37bdbb7a72b733276e8d29a14703b7a375310dd3e471e689f8a788918cfc8a15540ae5ae7424033956c6ca1719f4bce86cc7f5c053440b205d671c2ae0f35d8d9096c0b2d3487c84c7104642eae7e4791db6e9b1e53cae8363152fc659b64438a64b6285ddc53c93e49aef8c423c019edf3922fd89b001a47d01ba779ae1c32d4168c52a1424c78bd3d7478756d1812664cfb20123ada07d81d2954e49608866b6e39e109a59698961585cce8f3e39c455aa0c13f8b8e972c169ae07a3927de587fc49d475582b04790af14cbf261ad38d043314dae8b99b1b66a9fa437a5b216bb28aa870cae119f2733eed8db3625ff36581484232a1b17553384ef83728e4b1f746cb051c1466285ac3515bcb6eef386ad9e7987260cd116b78b7d5c13ec3502da9e75d96df2909762170fbbd9c0a392b2aa84c040ad1abd713be46e20f512cd8a6a6ee91f412cf8e72e28c0733655738c63e92d99ca925ba8171432d87008a4f79fa10e450b9854925cf64e97fe0b3d8d1d881a92d9b281bc593c4eceafcb7a85c67fc6309d54df5e61d76e98d118bdf2b8ac9c864c54d385a29b650a523361e2cfb2a8dc9855cc52f4c68710746739b55c407aa2ab7743c505b1737fd8f446164c85dbfba0d239e9c5b84dabb2fafbc1322575452b700676d1ed28c64336df8b0252401803d21190bd89dd8be0a5afcb7d559b25659af4c3a16a24de6b7161bb46c21838fa6899b0f1cb8f71f8e33e9930d931f5173818c0707ee8739ca5ab26e54f19698f024c30d6288f27116e17e3946e0c2d505f1890048aee376bbd3cc293545de02c9f49c2af7d6fb59ca287efa86d723895a75a01b484718e27b2302b348e5c5f0fb365f5bc8850ad0fc3198235e7bf76e59511deab2bbeefec3eba98755fc84d28451f222ef8871d557b4bd78afac0783674c6a10d710c4771da85c920ec3465d3be5938b3501aac9c2da1fd01237c9012c9a8c8b8902bcb9bd81e6213389444e0f5253b8a29728d6dcc8675efe785f64370eee16273d47f80c9874e637572ee0368e57eec3f053a2d8f31009e3c2c47f020fc6574549163f74fdf91d522eb34bc7a1fc0ab954dc124c61123fbd151af641003792a2bf26eca78a8dbe0865ce13da7e72d8c63e096ab6ce8dd7393dbb31b466decd50ece423dcc97c16ba01d1ecd78930669e0c11337a2165147b77f78f781d2ceb233effd00bc16f49ff92fb89a1b538f17713b5f81ad5fcfa4bbb46931256af073189b3ce2119eb8f70f55b1077cf828ed67057f937ff1641d369f7667e5b75b079d187d2f2306b646741901a52e5cf5c9cee4439ce567e8b34d85fef82e66704de6288ab54024419e0f698829665b04bf06272ad7d8653bea2dcb6ef762b27e78d9f82159e8514cf4b518234a22cf4fb8d10ca5983ebc3ffa00fbbf42d6ee871a5149586e8f7201b34618c49dbc73f02cfc6505cb30053bd150c597acff4025721e1525b56add5da8d7cdf1829dfac83178d7a568c53adb0156cb8852431eb91bb42a23cc8af8eb2fb3abde862dd62b75b29aaee8ed98141706c682b8c23b35708ebf2c85985d5c135fef79e19131c49941a5e7e13f5547ced1ef47f0b3dbc40effe4d7042dd3451fbe25446c7e5641190340adabf9f53326043ca5111f0dfdb3dc9e713dd04284b97a17cc15b1a767d87653b51fb712ae24b8acaea8ff3010793a5c0cf5cd109b7710ad94b15d2422f89d94384ecec259285d864e1d3a4507307df613699171db9ab37bf3b41785e17700f64d9da4bfdc47b42e4e9711c3dcc0c5197d7f1d08dc2b2f65ce7d9c0fa1d734fee585108c73252fd72b8d45852b8157c700dde99218746694a68dd13bca4ee5ac82f23cdfcc452dcd1062717e5c3b05f7576eef139d507344cef037c10af821ef57b2fe8b96285bfb9bff82924b7f071692fec87e6e36033b82fdd883e7cabd4fe3f396bb582e640f5389e40b5cef8caf6f60891b36cd2bb22ceed8e06727ee969044ed0a47d8fa72418bd96a2c50e7457e7a42bb60d344220a1ea42577dd75f0d5135321893b39f30f4ee77f599ac773547136abb2a8547147c9fc8f4782b599deb9559db5572b79deba1c4e983b94da764aec87ba687d0f8dcb1663336e35fc89925af68e113a29e3d86c728d7f8f7d2670a35a055060b6d37df3068caaa508b663e605bb29b12d5efde30c5c8800bfb326aa512a838eb70192e9494432a8829ed943247d463fd48c084050b3a34606056a4388d4825d51183331c0372e48ab90962a2f0e9e4c3287a5debfdb5b41795ee625ff3edd411f98587373bf48e50de2c2030350befb9be7823dfdf506e0e3054ed0f4632ffb5692f183ac3dd4c63218359a641c8c98b3056f0c91fb1c5111621b3cd839fa83d9f96e6105e0dfeb962e6b1256d3679ac7dbcc59d996069ca1756e71af35e92bb2d4a080ac199a40af5493c67d7983979b61faa5c09d47678c9d0b8d9abc747c70e65d105e689b7c4185703f1fadbea52320add913160f0ca73959d5dfaf0928063e957fd34a03d2459ddd83517ebefc0f5ed2ad0480c707b2fe8373827ccbd745dfbc220605f91c390d82e8047a8809dcd53bd7f07ac229bbeb304a1fbf31c23388a38e22c7b49a94a3a92a1fd089b0ace829f60e81fc47c52aad9e065a3d041baf23b48096105a27ff6e7399246eb56cadddde9ef4170fe5ebcb551c78b653a128b9bd074cdab262d5412d9c3a91fc0cb9036fe0e843cc1ea0074937b590d067a33c3116891c0ba9c460a6d30094f51fd97c01ad84e8f57d95f6ea808dd6a21dc4b35040a4535680940c29c9de99f97e3cb9abdc9ca54aaf0fdeaffd4ba436c48939da0ce88cddf8d18a15d573b7e7befbc0c73cae50e1fabcc72b9ff3f2e1b042c4d251f08bffe2ba8c7b5e1be8fc37542614d96e127726b6d48835fad32f43d95b61f4873560e56c532129d9a845b6fffc0aba429ad39383fa09a36df89897a7eb9e0a5fb0bfb24e4526d830fa5aa50bf4161ba15731c00547043070313f8329dc3083b92705fe2911b25a300c6b6218932f100897d00d4da9c09e1db225b6ff972722d19c99aebe2ff0d363b78adfaa690971ab93e1b7cd19ca021e97e21440eac4a70f30ee5cb4cb3758d602c2570d82fb0d72cb966a8fea60e5b142b48d774cefc0f56af5d84099fa3a3f89718a9f01b1454784375bce65018df9daf08b6fc066e8b163d762e4a943cb89e4583b3396cbd628399e40130e634ecff690e02c5dc5a81c9ae60f65cf1eff068eb9bc7d9b9e68578d2d75502c3cb048469bd1d8d4d32d73aec1ccba7d5102b9916e913d7e1bff3beec2fef1f9eede9e56192b13105a7355bedc5903c31ab762131cb84480ffb51a6b57f80c2324d5e25901993b8bc8601f749ccf9d889983ee6c409e56d7e1b04ac0d903829c932f2508514b1e3b9a350a25d0de9036ae3b26278ffbf2d788a1e5fa5884de094eb00425ea1383388bd02545278561f7399a8bcf43cb3e36f946a457f6190953d29196da1d727bc102921eccf395d80383855367af626b55ebe4d7054fe0a396b572f1922a9a435d09fe20f9e60c9cfc013b1ef6e6a98fdfa14e2b7d81786a2ee1f85b594bfb7865ad55f334e262a1bae264e3c516695c2d0a4a9011177c065050acd5a9ab7d6fcddc42bcad0ec2817af51a4a41c4d88b84b16fd3be5dd1aa697a9ca7ef56f7cb188b048b19e6938906ce6195851414ebdb4d09c336b898212f630da943c35e7d17d1f041194e128587823fbede9055c04f643672969b53a326be93561eb01af9b7cc68e6aba64557a3c66dd76abe514729f5dccfdeb854d899da1c33bebe36e790e1e751a4ada7c905e17eaa5fcbf60799532d2757052ccc6627a9cbcb526da86ebab26da9551f2abcad039d013c3605abd20b2aeeda413f99a1a038791eaef99278bc8170b30d109469182a7b72d5044dcfb59201b0b42666fe20d2010b26945386b07e1ada3644a186b7fa1eb1587e74721f21899e724c019f93a697538db54cee00b486e95815018a8f3547344b7f211323c6f309dc278207eff43acd3498f16c62d3ab20427bee350481ff2a8a8d96efb33d2959faa1ec559e5825654071b08369a3aa461e673f2e699b62ff41fa1b80297e6e8f9f3ec138cb855ab0682a937dd8e4346355d1f5297825c4afee9815b60857a8a9973f458164c3f096d162a29c4a9bab37bb17f2513c2f4f7703b7e646fc53a89dbacbeedac3d7abf80682cffa73a1c327a3b565e916160b69a844891e057347add7bcbeebd30bef4d5a719fe0dd30fbcd6a77eed4c7c7c774108581335eb7daf592165e456d3e148ff60e901df5fbb98612ab60018aef16cd495d8d9a2a087533e48a17331c9118902c1a800691ec141e7775d086f2fb55f9bee3a130c50503678deecb737b2260e277a9891f331dac00a6d929be26e5dbe45c133a3f98e054248a705ce7915eccfba2ef3aece2e8208cfab4835138646e8fc16e7cfa147bbb264d6eb7eb041347e06f0ed65d3dd78c31101934dc820c4a323beddb03519642050ebf4c92d0677bbc7a07231942213e3c339e0ea716ead70581acafac6081544358ea7a00fa80f3adf41b89d78716a1bb22424e2d99a26801b956e6066c0a3c17cbca74f94034c726636010f205b01a8d057a822cc33eca419484667cb0bbe84fa604520a088686fe5ca1676984026582bf97f8dcf0cd090b978f62bd444d00e65378d30acc55428375b7184008d45d945da0381ad11dce4e96d7ed8c317fc7555e111771be6b1904f3515c5eb236b811772258e49df79435e6c4783eb134ce61270dd84a9128f00278b099ebbeb2ba8b692bf614e1af0f257917625a0d6b8693d8fb5317f7d0b8fc450d5c7caf9a65133c4ef947214b4793609121fa2430e06959932123d0bdd97eca2c5a3ed6fdb78480fcf45013d092054a11f6d7576b7b38de1ff3adff3c4f18773230194f0ac772ab9819e49c5d7f34a7109bb255f6a540f9e47a19b3f353d12c4cd3bfeaa16d92e8c0f3ec1e05e4b5be78171949ae5ab1cd4bfce7efb4d49ba33720b1185bf3a36798558e3957fe8ab543e863bc2d9f204dad72bcb49cc5108d668ad55f0874a49cb862ea20d8bfebc8ffd61db44f8134511c8c0b26c06a29bf36b8cabc2c4d32cd4ce6de3886e02a8a7584ba158d2c4b28d568c622b2868a4376e26e396bbbe00c870e6239a7f63a60064ac3f333e69e16805e12a6fa403c3ffa1df347218afe09a98246134dc977e0e63e2281b201f30207c17569812ebf3ce9b05418d131874282524809aca13691056cf21e2b2141f5dde386aee0cb35f585fdd8bf78f775ed62702b126ecc1186f32d44940b3114e163841df8e3", 0x1000, 0xff}], 0x400, 0x0) [ 1321.909499][ T7471] BPF:No type found [ 1321.925731][ T7461] loop3: p1 p2 p3 p4 [ 1321.986081][ T7461] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1322.072584][ T7461] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 01:36:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000200"}) 01:36:30 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xfeffffff00000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:30 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a, 0x2) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xa8001, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x8000b02) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1322.271787][ C1] net_ratelimit: 14 callbacks suppressed [ 1322.271798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1322.283231][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1322.335867][ T7686] BPF:No type found [ 1322.373050][ T7690] BPF:hdr_len not found 01:36:30 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x39870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000300"}) 01:36:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1322.671763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1322.677569][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1322.685816][ T7701] loop3: p1 p2 p3 p4 [ 1322.706473][ T7701] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1322.760178][ T7701] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1322.831752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1322.831759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1322.831784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1322.837564][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:30 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000400"}) [ 1322.911760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1322.917599][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000014c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1, 0x0, 0x3}}, 0x20) 01:36:30 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3a870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:31 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000500"}) 01:36:31 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffff00000000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:31 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x2, 'rose0\x00', {0x3}, 0x6}) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1323.361959][ T8150] ptrace attach of "/root/syz-executor.4"[8147] was attempted by "/root/syz-executor.4"[8150] 01:36:31 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1323.416455][ T8175] BPF:No type found [ 1323.443286][ T8057] loop3: p1 p2 p3 p4 01:36:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1323.466628][ T8057] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1323.473670][ T8185] ptrace attach of "/root/syz-executor.4"[8184] was attempted by "/root/syz-executor.4"[8185] [ 1323.488820][ T8181] BPF:hdr_len not found [ 1323.502272][ T8057] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:31 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000000600"}) [ 1323.632315][ T8194] ptrace attach of "/root/syz-executor.4"[8193] was attempted by "/root/syz-executor.4"[8194] 01:36:31 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3b870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:36:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1324.161849][ T8314] loop3: p1 p2 p3 p4 [ 1324.180431][ T8314] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1324.192102][ T8314] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 01:36:32 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3c870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:32 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffffff600000, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:32 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0x65) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000002400e50d000011000000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x38}}, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000001c0)=r3) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x6}}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x28, 0x0, 0x37, 0x1}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x4d, 0x0, 0x34, 0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x1}}, @union={0x6, 0xa, 0x0, 0x5, 0x0, 0x100, [{0x8, 0x3, 0x6dd}, {0x9, 0x4, 0x4}, {0xb, 0x5, 0x5}, {0xd, 0x5, 0x1}, {0x5, 0x4, 0x9}, {0x0, 0x0, 0x6}, {0x9, 0x4, 0x1}, {0x4, 0x4, 0x9}, {0xa, 0x0, 0x1}, {0x9, 0x3, 0x79}]}, @union={0xb, 0x7, 0x0, 0x5, 0x0, 0x9, [{0xa, 0x3, 0x25}, {0x7, 0x5, 0x10000}, {0x5, 0x0, 0x1}, {0xb, 0x1}, {0x4, 0x1, 0x401}, {0xa, 0x3, 0x3}, {0x0, 0x1, 0x1}]}]}, {0x0, [0x0, 0x0, 0x2e, 0x0, 0x5f]}}, &(0x7f0000000080)=""/90, 0x153, 0x5a, 0x1}, 0x20) close(r4) 01:36:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3b44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_proto_private(r2, 0x89e0, &(0x7f0000000780)="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") r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400000000000117, 0x0) [ 1324.673316][ T8541] BPF:No type found 01:36:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1324.793342][ T8552] BPF:hdr_len not found [ 1324.805332][ T8542] loop3: p1 p2 p3 p4 [ 1324.846040][ T8542] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:32 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) accept$inet6(r0, 0x0, &(0x7f0000000040)) [ 1324.897217][ T8542] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1325.014491][ T8772] BPF:No type found 01:36:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:32 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000ff00"}) 01:36:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000001900"}) 01:36:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:33 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3d870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1325.573646][ T8896] loop3: p1 p2 p3 p4 [ 1325.594882][ T8896] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1325.622434][ T8896] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:33 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0xffffffffffffffe0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 01:36:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 01:36:33 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000600"}) [ 1325.802718][ T9017] BPF:No type found [ 1325.832125][ T8896] loop3: p1 p2 p3 p4 [ 1325.858278][ T8896] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1325.892175][ T8896] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1325.905884][ T9017] hfs: can't find a HFS filesystem on dev loop0 [ 1325.927609][ T9025] BPF:hdr_len not found 01:36:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:36:33 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3e870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:33 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000500"}) [ 1326.026973][ T9017] BPF:No type found 01:36:33 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0]) r1 = socket$inet6_sctp(0xa, 0xaf98955d78d21306, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x7f, 0x5, 0x4, 0xfa, 0x80, 0x3, 0x8, 0x80, 0x1, 0x1, 0x1, 0x6, 0x9, 0x7}, 0xe) [ 1326.272464][ T9036] loop3: p1 p2 p3 p4 [ 1326.277287][ T9036] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1326.291477][ T9036] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000000035b00"}) 01:36:34 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3f000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1326.453604][ T9047] BPF:No type found [ 1326.494444][ T9047] hfs: unable to parse mount options 01:36:34 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000001900"}) [ 1326.832181][ T9160] loop3: p1 p2 p3 p4 [ 1326.844279][ T9160] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1326.872265][ T9160] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:34 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x3, {0x55d}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:34 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40100, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x2c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x82301210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r2, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1327.079871][ T9275] BPF:hdr_len not found [ 1327.093180][ T9271] BPF:No type found [ 1327.106550][ T9271] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 1327.129728][ T9271] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1327.401796][ C0] net_ratelimit: 24 callbacks suppressed [ 1327.401809][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1327.413290][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1328.511802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1328.517614][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000500"}) 01:36:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000000000ff00"}) 01:36:36 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x3f870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:36 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0xa00000, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980914, 0x7, [], @value64=0x9}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r2, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8002220}, 0x8, &(0x7f0000000140)={&(0x7f00000001c0)={0xa, r2, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) getsockopt(r1, 0xff, 0x1, &(0x7f0000000380)=""/78, &(0x7f0000000180)=0x4e) 01:36:36 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="9f00000000020000000000"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x41519ee0fc651703, 0x28812, r0, 0x0) r1 = getpgid(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, r1, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000300)=ANY=[], 0x6) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1550490}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="0000e3ff", @ANYRES16=r5, @ANYBLOB="10002778d8d2f9dbdf250400000008000300090000000800020007000000"], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x8080) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={r6, @rand_addr=0x1, @empty}, 0xc) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r7, &(0x7f0000000300)=ANY=[], 0x6) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x2000c00, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r11}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) open(0x0, 0x800, 0x0) [ 1328.773982][ T9515] BPF:btf_header not found [ 1328.819140][ T9517] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1328.873304][ T9518] loop3: p1 p2 p3 p4 [ 1328.911805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1328.914511][ T9518] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1328.917709][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000000ffffffff00"}) 01:36:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000400"}) 01:36:36 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x1b0, 0x80, 0x33, 0x0, r4}, {0x3fde27fc, 0x7fffffff, 0x0, 0x0, 0x5, 0x7, 0x2000000000004, 0x1}, {0x0, 0x3, 0x7ff, 0x5}, 0x0, 0x6e6bb8, 0x6, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x3503, 0x8476f732d1874694, 0x0, 0xb8, 0x3, 0x4e9}}, 0xe8) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x1, 0x4, &(0x7f0000000600)=[{&(0x7f0000000480)="99042fad7afec94f0c5acdc575ea61435a7324d75e72fc1861662c81633cbbfdbf1c5fca0488d67697271b25665c4bf7b04aec50ffe0540f0ec3e301777698f6c0dbd8e7b599f8aa792d5b3b47a4a164595425159e7b39c4e4ecd3832fdbc7f53fca4dda8702fa90891dcec8b836e00a27aa18bff35d1b253dda853309ebd47ac66bc0ddad7ec7fa0735db0d6072c7d6eb0378883577e3e7676231130250b869402e03626dbaa810479e5e6b118bb2ed721a77695bafa9f6aa7f30", 0xbb, 0x20}, {&(0x7f0000000100)="3eef07f48b2b4804d592310072cfa4ef6ee5ac5007310f1ee89f1d34a5b633fb", 0x20, 0x2}, {&(0x7f0000000540)="164d9a87cd64f9eba2101b06c57c7f88f79966b095092b808263624b59930b687bbca32ae9f763dcca031ad78de3d75408cdce6518641d509202c13a7bfee2af8b8022c5572c391d88c40a3e5ced34676a57c1061c80a1e33e82406cc90345697670b62e08d3ba560851c79714cf818305a27d50adb311387ddd0e8d2172c8d916eaceba13335e1cf2435d861ffc84360d6356cdf1981d91aa013aa8ce22f479fb491003a82e164ed42d1ae3e7f4854f", 0xb0, 0x5a5}, {&(0x7f0000000140)="adebd04d1a82514989bf3eb00f521de1d579b9bb346989182b280e09b9cebb1c24bbb88d4e787d", 0x27, 0x203}], 0x0, &(0x7f0000000780)={[{@iocharset={'iocharset', 0x3d, 'cp852'}}, {@uid={'uid', 0x3d, r3}}, {@noquota='noquota'}, {@usrquota='usrquota'}, {@resize='resize'}, {@resize_size={'resize', 0x3d, 0x1}}, {@uid={'uid', 0x3d, r4}}, {@integrity='integrity'}], [{@appraise_type='appraise_type=imasig'}]}) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r5) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x3, 'vlan0\x00', {0x2}, 0xfff7}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1328.992107][ T9518] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1329.071762][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1329.071781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1329.077547][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1329.083265][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:36 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:36:37 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x40000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000200"}) [ 1329.337342][ T9752] BPF:No type found 01:36:37 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000300)=0x6) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)={0x3, 'rose0\x00', {0x5}, 0x1f}) [ 1329.552846][ T9885] loop3: p1 p2 p3 p4 [ 1329.558486][ T9885] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1329.585469][ T9885] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1329.625381][ T9966] BPF:hdr_len not found 01:36:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:39 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00?\x00'}) 01:36:39 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x40870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:39 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000002000000000000b09db94f266dc5b23be2958c5726f59484263fcf3cd25ad83ed00000317a3f6a29844d1a74791935c31f88761713da4a2ac3433d9a29ac0e08b46e6a5ad77d3523cbda6b460324b37c0b829bce2adfe888304745fca2c363382489ef29766fe59d6fec2e8ac4f2a93f0495a06492a3fb771b930637827ec11046c91fdfef"], &(0x7f0000000480)=""/249, 0x99, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) accept$alg(r0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000100)) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttynull\x00', 0x40000, 0x0) 01:36:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000300"}) 01:36:39 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000080)=0x1, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1331.872379][T10088] BPF:hdr_len not found 01:36:39 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000600"}) [ 1331.957233][T10097] BPF:Unsupported section found [ 1331.978979][T10084] loop3: p1 p2 p3 p4 01:36:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffffffff21, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0x0, 0x7, {0x10001, 0x4, 0xffffffff, 0x9}}, 0x20) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000000c0)={0xae, 0x1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x4000000, 0x6, 0x3}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0xd, 0x1fd, &(0x7f0000000480)}) [ 1331.999203][T10084] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1332.052833][T10084] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000400"}) [ 1332.099152][T10205] BPF:Invalid section offset 01:36:40 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffc2, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000b40)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES64=r1, @ANYBLOB="87e2c01b70fe43bdf0cfae37b0ae09f2baa90f6dadf24a40f48136fc11fb17c18ba4fc26da588c33c759911591b9d42c2e8a620a04050250afb67f40dbc4e94313c7c6156abfda2b6a4dbde39444b93072aff62e80918786f4e343c80f80689eb58c5d7d93cdc9bcb2566ac2d001bda9907a9c578128d6b86b998687a88ea9592ee36ead7167da0ad2af67c43ca31de2b1ee9c0cc4f275821a4369d69b59cdd095e63f62fd8c50b03d3c5ca9a892f12a", @ANYRES16, @ANYRESOCT=r3, @ANYRESDEC=r2, @ANYBLOB="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"]]) 01:36:40 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x41870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffffffff21, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0x0, 0x7, {0x10001, 0x4, 0xffffffff, 0x9}}, 0x20) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000000c0)={0xae, 0x1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x4000000, 0x6, 0x3}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0xd, 0x1fd, &(0x7f0000000480)}) [ 1332.436323][T10220] BPF:No type found [ 1332.546919][T10226] BPF:Invalid section offset [ 1332.602724][T10228] loop3: p1 p2 p3 p4 [ 1332.610330][T10228] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1332.634736][T10228] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1332.681800][ C1] net_ratelimit: 14 callbacks suppressed [ 1332.681809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.693260][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.071759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1333.077593][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.231763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1333.231781][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.237668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.321764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1333.327622][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1333.641816][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:36:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000500"}) 01:36:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffffffff21, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0x0, 0x7, {0x10001, 0x4, 0xffffffff, 0x9}}, 0x20) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000000c0)={0xae, 0x1}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x4000000, 0x6, 0x3}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x1a, 0xd, 0x1fd, &(0x7f0000000480)}) 01:36:42 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$sock_bt_hci(r0, 0x0, &(0x7f0000000080)="9b21b53103692a8bdaca29f700bbb2a31e74f89eb010d924f20d467bb4611f8878ae45c1611741d4fb7d9e569589ce20be26ee7ec186fd37a5a0a28c4d768b2358254f74bf8f8154191a6ff675702dcf245cf409f3d0b785c6eb64b110cc16a1a2526a90532781d6b73105fcb5a6006781e0ee70d3") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:42 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x41a9e50b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:42 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xc0000) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000040)=0xa531) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1335.002201][T10449] BPF:Invalid section offset [ 1335.007880][T10456] BPF:hdr_len not found [ 1335.008317][T10451] BPF:No type found [ 1335.072449][T10455] loop3: p1 p2 p3 p4 [ 1335.078028][T10455] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1335.107959][T10455] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:42 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000600"}) 01:36:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:36:43 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x42870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\a\x00'}) 01:36:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1335.732863][T10585] loop3: p1 p2 p3 p4 [ 1335.738337][T10585] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1335.811573][T10585] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:43 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\t\x00'}) [ 1337.791787][ C0] net_ratelimit: 22 callbacks suppressed [ 1337.791793][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1337.803615][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:36:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) 01:36:45 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000040)={{0x67, @remote, 0x4e20, 0x0, 'wrr\x00', 0x4, 0x7, 0x58}, {@loopback, 0x4e21, 0x2, 0x0, 0x9, 0xffffffff}}, 0x44) 01:36:45 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x43870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000001900"}) 01:36:45 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x8b}, 0x16, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1338.072044][T10815] BPF:No type found [ 1338.094750][T10820] BPF:hdr_len not found [ 1338.152443][T10822] loop3: p1 p2 p3 p4 [ 1338.157661][T10822] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000300"}) [ 1338.200380][T10822] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000005b0300"}) 01:36:46 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) io_setup(0x4, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x3ff, 0x9, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1}, 0x8}) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:46 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x44870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1338.695145][T11046] BPF:No type found 01:36:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000500"}) [ 1338.756821][T11046] hfs: unable to parse mount options [ 1338.834157][T11046] BPF:No type found 01:36:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) [ 1338.911768][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1338.917605][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1338.962224][T11127] loop3: p1 p2 p3 p4 [ 1338.986527][T11127] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1339.049768][T11127] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1339.311766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1339.317746][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1339.471771][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1339.471789][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1339.477654][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1339.551772][ C1] protocol 88fb is buggy, dev hsr_slave_0 01:36:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:48 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000040)='./file0\x00', 0x55100, 0xe9) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x2}) 01:36:48 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0xffffffff, 0x2, 0x4, 0x40000, 0x8b32, {0x0, 0x7530}, {0x7, 0x19, 0x82, 0x1c, 0x7, 0x4, "16000040"}, 0x101, 0x3, @offset=0x41, 0x2, 0x0, r0}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) 01:36:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000000600"}) 01:36:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)=0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x7}, 0x18) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "f813d12d29bfc5cf", "ef2f4fdecf6d3702eb49b9b9d949f8ad", "9aa786a0", "b3e47d283fa68999"}, 0x28) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) splice(r0, 0x0, r1, 0x0, 0x110000000, 0x0) 01:36:48 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x45870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1341.141313][T11385] BPF:hdr_len not found [ 1341.199645][T11391] BPF:No type found [ 1341.262534][T11388] loop3: p1 p2 p3 p4 [ 1341.281578][T11388] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:36:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) ioprio_set$uid(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) setuid(0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, 0x0, 0x80000, &(0x7f00000014c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}]}}) lstat(0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) setuid(0x0) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) mount$fuseblk(0x0, 0x0, 0x0, 0x80000, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) ioprio_set$uid(0x3, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x80000, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) ioprio_set$uid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYBLOB]) [ 1341.310637][T11388] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:49 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x46080000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:49 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000005c409335912872f600000000000000ee8e1d1070d5f215165647c5f3048e829a6908abb9d0098e72f42fce1ff43f1e4ce28aa6a9979f52f15de1b9d80f95071611c39ebe7e39417f8a511d0543e73db8db26cede1d66afb963dd959216beba05f5cf6200c21233caa6c0840e1fb1e623cd38543b136ed2f816b91a6cdcb3a54398e63de2b64d54f7b36672234fba2cdcd183e7733800"/176], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) fcntl$dupfd(r0, 0xc0a, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r6) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$VIDIOC_G_CTRL(r5, 0xc008561b, &(0x7f0000000200)={0x1, 0x4a}) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000040)=""/12) syslog(0x2, &(0x7f0000000480)=""/4096, 0x1000) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r7, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000003440)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r7, 0xc008551c, &(0x7f00000002c0)={0x9, 0x1c, [0x3ff, 0x7, 0x4, 0xffffffe1, 0x28b, 0x3ff, 0x36]}) 01:36:49 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=""/257, 0x0, 0x62, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1341.647488][T11802] BPF:Invalid section offset 01:36:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x4) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="4c0000001200ff095ffefd956fa283b724a6006b00000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 1341.782460][T11831] loop3: p1 p2 p3 p4 [ 1341.788217][T11831] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1341.802318][T11831] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1343.071785][ C1] net_ratelimit: 15 callbacks suppressed [ 1343.071795][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1343.083270][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1343.471764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1343.477688][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1343.631784][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1343.631794][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1343.631817][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1343.721794][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1343.727681][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1344.031782][ C0] protocol 88fb is buggy, dev hsr_slave_0 01:36:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:51 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\t\x00'}) 01:36:51 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x46870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:51 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'veth0_to_bond\x00', 0x4}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x304}, "aeb00f42b224f529", "412ced2c76d4d95c3a94dd34e416b5a16a0688c8cd3b491cd0cb20ad22faa7a2", "50e4b684", "a966da425b238fcc"}, 0x38) 01:36:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) accept$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "f813d12d29bfc5cf", "ef2f4fdecf6d3702eb49b9b9d949f8ad", "9aa786a0", "b3e47d283fa68999"}, 0x28) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200), 0x4) splice(r0, 0x0, r1, 0x0, 0x110000000, 0x0) 01:36:51 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x9be2a2ae84c0883a, 0xf9, 0x8}, 0x225) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) bind$ax25(r0, &(0x7f0000000040)={{0x3, @null, 0x1}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) [ 1344.312380][T12157] loop3: p1 p2 p3 p4 [ 1344.317291][T12157] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1344.322276][T12163] BPF:No type found [ 1344.335047][T12157] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:52 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x1, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000001900"}) 01:36:52 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x47870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1344.555161][T12456] BPF:hdr_len not found 01:36:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000880200005801000098000000580100005801000000000000f0010000f0010000f0010000f0010000f0010000040000000000000000000000ac141400ac1414bb000000000000000062637368300000000000000000000000657072707d8e1000040000800032000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000028006367726f75700000000000000000000000000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, 0x0, 0x0) 01:36:52 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x81, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)={0x7ff, 0x400, 0x1}) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000300)=0x6) ioctl$RTC_WIE_ON(r3, 0x700f) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000180)=0x6, 0x4) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES32]) 01:36:52 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 1344.767107][T12486] x_tables: duplicate underflow at hook 2 [ 1344.842729][T12489] loop3: p1 p2 p3 p4 [ 1344.851690][T12489] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1344.869140][T12489] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000140)=""/169, 0xa9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000040)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r2, 0x0) 01:36:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:55 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x48000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:55 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) bind$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0xfb, 0x40, 0x22, 0x8, 0x0, 0x9}, 0xdf}, 0xa) 01:36:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00@\x00'}) 01:36:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x9d36187390c0b13e, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000040)=0x3ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT]) [ 1347.415091][T12824] BPF:hdr_len not found [ 1347.420812][T12822] BPF:No type found 01:36:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "000000000000035b00"}) [ 1347.492478][T12826] loop3: p1 p2 p3 p4 [ 1347.497287][T12826] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1347.511057][T12826] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 01:36:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000380)={0x7b}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) keyctl$invalidate(0x15, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000040)={@ipv4={[], [], @multicast2}}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x12000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:36:55 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x48870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:55 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x80380, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0]) [ 1347.789042][T13144] BPF:hdr_len not found 01:36:55 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000ff00"}) 01:36:55 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffff98, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) [ 1347.986765][T13184] BPF:No type found [ 1348.020867][T13243] BPF:hdr_len not found [ 1348.043227][T13184] BPF:No type found [ 1348.096454][T13187] loop3: p1 p2 p3 p4 [ 1348.191778][ C0] net_ratelimit: 22 callbacks suppressed [ 1348.191788][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1348.203280][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1348.220645][T13187] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1348.271701][T13187] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1349.311807][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.317644][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1349.711802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.717654][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1349.871956][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.877719][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1349.882200][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1349.889188][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:36:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:36:58 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x14) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:36:58 executing program 2: 01:36:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000200"}) 01:36:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x49870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:58 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3a6, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) [ 1350.520420][T13500] BPF:hdr_len not found 01:36:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000100"}) [ 1350.559381][T13497] loop3: p1 p2 p3 p4 [ 1350.579109][T13497] loop3: p2 size 1073741824 extends beyond EOD, truncated 01:36:58 executing program 2: [ 1350.619581][T13497] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:36:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000200"}) [ 1350.695797][T13500] BPF:hdr_len not found 01:36:58 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4a870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:36:58 executing program 2: 01:36:58 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000300"}) [ 1351.258542][T13635] loop3: p1 p2 p3 p4 [ 1351.297005][T13635] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1351.338946][T13635] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1353.471845][ C1] net_ratelimit: 16 callbacks suppressed [ 1353.471856][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.483429][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:37:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:37:01 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x10000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r6, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r8, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r9) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r10, 0x0) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r10, 0x0) r11 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r11) r12 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r12, 0x0) write$P9_RWALK(r12, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r12, 0x0) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r13) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r14, 0x0) write$P9_RWALK(r14, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r14, 0x0) r15 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r14, r15) r16 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r16, 0x0) r17 = perf_event_open(&(0x7f0000000180)={0x6, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r16, r17) r18 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r18, 0x0) r19 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r18, r19) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r20, 0x0) r21 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r20, r21) write$P9_RWALK(r0, &(0x7f00000006c0)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYRES64, @ANYRES32=r1, @ANYRES16=r2, @ANYRES16=r0, @ANYPTR], @ANYRESOCT=r5, @ANYRESDEC, @ANYRESOCT=0x0, @ANYPTR, @ANYRES16=r9], @ANYRESOCT=r11, @ANYRESDEC=r21, @ANYRESDEC=r15, @ANYRES64=r17, @ANYRESDEC=r19], 0xff47) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r22 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r22) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0x53f) 01:37:01 executing program 2: 01:37:01 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000068000000000000000000000002000000003694111825d3"], &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:37:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000400"}) 01:37:01 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4b870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:37:01 executing program 2: [ 1353.652936][T13755] loop3: p1 p2 p3 p4 [ 1353.656035][T13761] BPF:Total section length too long [ 1353.665600][T13755] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1353.672160][T13763] BPF:hdr_len not found [ 1353.756316][T13755] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:37:01 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000500"}) [ 1353.871763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1353.877585][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:37:01 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0xfff4, 0xffffffffffffff2e, 0x8}, 0x20) gettid() syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:37:01 executing program 2: 01:37:01 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4c000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1354.031756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.031763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.031790][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1354.037581][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1354.111757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.117776][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:37:02 executing program 2: [ 1354.329796][T13889] loop3: p1 p2 p3 p4 [ 1354.358299][T13889] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1354.383780][T13889] loop3: p3 size 1912633224 extends beyond EOD, truncated 01:37:04 executing program 2: 01:37:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:37:04 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "0000000000000000000600"}) 01:37:04 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4c870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:37:04 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x400, 0x74, 0x6, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x5}, 0x3c) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2700880, &(0x7f0000000000)=ANY=[]) 01:37:04 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, [@union={0x6, 0x0, 0x0, 0x5, 0x0, 0x1ff, [{0xd, 0x3, 0xe5e}, {0xc, 0x3, 0x5}, {0x10, 0x0, 0x6}, {0x1, 0x5, 0x8}, {0x8, 0x3, 0x1}, {0xe, 0x1, 0x6}, {0x10, 0x2, 0x9}]}, @fwd={0x8}, @volatile={0x5, 0x0, 0x0, 0x9, 0x1}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0xe, 0x4}, {0x5}, {0x5, 0x1}, {0xf, 0x3}, {0x4, 0x5}]}]}}, &(0x7f0000000380)=""/249, 0x1a, 0x143, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040), 0xf6de, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) 01:37:04 executing program 2: [ 1356.752400][T14113] BPF:Invalid string section [ 1356.756229][T14111] loop3: p1 p2 p3 p4 [ 1356.759229][T14115] BPF:hdr_len not found [ 1356.776784][T14111] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1356.802030][T14111] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1356.822579][T14115] BPF:hdr_len not found 01:37:04 executing program 2: 01:37:04 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 01:37:04 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000300)=0x6) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0x7, 0x0, 0x4, 0x4000000, 0xffffff01, {r4, r5/1000+10000}, {0x1, 0xc, 0x3f, 0x4, 0x7e, 0x6, "8363c1c1"}, 0x1, 0x2, @userptr=0x9de, 0x4, 0x0, 0xffffffffffffffff}) connect$rxrpc(r6, 0xfffffffffffffffd, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r8) ioctl$EVIOCREVOKE(r7, 0x40044591, &(0x7f0000000300)=0x6) openat$cgroup_int(r7, &(0x7f0000000140)='io.max\x00', 0x2, 0x0) dup2(r0, r1) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x6) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "3c08a3baa0e5de23", "9f37272a559980777d45456596deed52", "e8d10bd4", "85fcd111bcfa551d"}, 0x28) 01:37:04 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, [], [{0x0, 0x9, 0x80000000, 0x4, 0x5, 0x3}, {0x7ff, 0xfff, 0x4, 0x1f, 0x353dfdfc, 0x1f}], [[], []]}) 01:37:04 executing program 2: 01:37:04 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4d870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1357.228174][T14346] BPF:No type found 01:37:05 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) [ 1357.486214][T14470] loop3: p1 p2 p3 p4 [ 1357.505615][T14470] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1357.602492][T14470] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 1358.591800][ C0] net_ratelimit: 23 callbacks suppressed [ 1358.591806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1358.603319][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1359.711789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1359.717739][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:37:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x75}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/47, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 01:37:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x141c0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f00000000c0)=""/191, &(0x7f00000001c0)=0xbf) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x101000) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040)=0xd49, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) r2 = open(&(0x7f00000006c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x880304}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r3, 0xf00, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x40, 0x80000000, 0xf6, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000869) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000600)=0xe, 0x80c00) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000640)=0x101, &(0x7f0000000680)=0x4) clock_gettime(0x0, &(0x7f000000b4c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f000000b280)=[{{&(0x7f0000000d00)=@caif=@dbg, 0x80, &(0x7f0000001140)=[{&(0x7f0000000d80)=""/91, 0x5b}, {&(0x7f0000000e00)=""/2, 0x2}, {&(0x7f0000000e40)=""/134, 0x86}, {&(0x7f0000000f00)=""/37, 0x25}, {&(0x7f0000000f40)=""/151, 0x97}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000001000)=""/121, 0x79}, {&(0x7f0000001080)=""/156, 0x9c}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x9, &(0x7f0000003800)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000001200)=@nl=@unspec, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001280)=""/12, 0xc}, {&(0x7f00000012c0)=""/253, 0xfd}, {&(0x7f00000013c0)=""/219, 0xdb}], 0x3, &(0x7f0000001500)=""/194, 0xc2}, 0x20}, {{&(0x7f0000001600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000001680)=""/8, 0x8}, {&(0x7f00000016c0)=""/131, 0x83}, {&(0x7f0000005800)=""/102, 0x66}], 0x4, &(0x7f0000005880)=""/106, 0x6a}, 0x7}, {{&(0x7f0000005900)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000005980)=""/126, 0x7e}, {&(0x7f0000005a00)=""/194, 0xc2}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/97, 0x61}, {&(0x7f0000006b80)=""/4096, 0x1000}, {&(0x7f0000007b80)=""/176, 0xb0}, {&(0x7f0000007c40)=""/68, 0x44}], 0x7}, 0x7fffffff}, {{&(0x7f0000007d40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000008180)=[{&(0x7f0000007dc0)=""/221, 0xdd}, {&(0x7f0000007ec0)=""/175, 0xaf}, {&(0x7f0000007f80)=""/143, 0x8f}, {&(0x7f0000008040)=""/142, 0x8e}, {&(0x7f0000008100)=""/28, 0x1c}, {&(0x7f0000008140)=""/27, 0x1b}], 0x6, &(0x7f0000008200)=""/179, 0xb3}, 0x100}, {{&(0x7f00000082c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000084c0)=[{&(0x7f0000008340)=""/108, 0x6c}, {&(0x7f00000083c0)=""/246, 0xf6}], 0x2, &(0x7f0000008500)=""/79, 0x4f}, 0x3}, {{&(0x7f0000008580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000008900)=[{&(0x7f0000008600)=""/191, 0xbf}, {&(0x7f00000086c0)=""/152, 0x98}, {&(0x7f0000008780)=""/88, 0x58}, {&(0x7f0000008800)=""/200, 0xc8}], 0x4, &(0x7f0000008940)=""/227, 0xe3}, 0x9}, {{&(0x7f0000008a40)=@rc, 0x80, &(0x7f0000009c80)=[{&(0x7f0000008ac0)=""/213, 0xd5}, {&(0x7f0000008bc0)=""/85, 0x55}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/40, 0x28}], 0x4, &(0x7f0000009cc0)=""/189, 0xbd}, 0xfffffff7}, {{&(0x7f0000009d80)=@generic, 0x80, &(0x7f000000b100)=[{&(0x7f0000009e00)=""/116, 0x74}, {&(0x7f0000009e80)=""/26, 0x1a}, {&(0x7f0000009ec0)=""/113, 0x71}, {&(0x7f0000009f40)=""/4096, 0x1000}, {&(0x7f000000af40)=""/163, 0xa3}, {&(0x7f000000b000)=""/239, 0xef}], 0x6, &(0x7f000000b180)=""/241, 0xf1}}], 0x9, 0x40000000, &(0x7f000000b500)={r5, r6+30000000}) getpeername$llc(r7, &(0x7f000000b540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f000000b580)=0x10) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) 01:37:07 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) 01:37:07 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000380)=""/249, 0x1a, 0xf9, 0x8}, 0x20) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x276f7bd78c562abc, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffff09, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) 01:37:07 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_read_part_table(0x4e870200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa60008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:37:07 executing program 2: [ 1359.855755][T14581] BPF:hdr_len not found [ 1359.864440][T14583] BPF:No type found [ 1359.873975][ T9606] ================================================================== [ 1359.882145][ T9606] BUG: KCSAN: data-race in __process_echoes / n_tty_receive_char_special [ 1359.891506][ T9606] [ 1359.893846][ T9606] write to 0xffffc9000950e56e of 1 bytes by task 14585 on cpu 0: [ 1359.901578][ T9606] n_tty_receive_char_special+0x1307/0x1c10 [ 1359.907486][ T9606] n_tty_receive_buf_common+0x1844/0x1b00 [ 1359.913395][ T9606] n_tty_receive_buf+0x3a/0x50 [ 1359.918165][ T9606] tty_ioctl+0xb75/0xe10 [ 1359.922428][ T9606] do_vfs_ioctl+0x84f/0xcf0 [ 1359.926970][ T9606] ksys_ioctl+0xbd/0xe0 [ 1359.931137][ T9606] __x64_sys_ioctl+0x4c/0x60 [ 1359.935735][ T9606] do_syscall_64+0xcc/0x3a0 [ 1359.940248][ T9606] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1359.946128][ T9606] [ 1359.948460][ T9606] read to 0xffffc9000950e56e of 1 bytes by task 9606 on cpu 1: [ 1359.956017][ T9606] __process_echoes+0x1cf/0x690 [ 1359.960878][ T9606] n_tty_receive_buf_common+0xe57/0x1b00 [ 1359.966514][ T9606] n_tty_receive_buf2+0x3d/0x60 [ 1359.971471][ T9606] tty_ldisc_receive_buf+0x71/0xf0 [ 1359.976607][ T9606] tty_port_default_receive_buf+0x87/0xd0 [ 1359.982346][ T9606] flush_to_ldisc+0x1d5/0x260 [ 1359.987037][ T9606] process_one_work+0x3d4/0x890 [ 1359.991912][ T9606] worker_thread+0xa0/0x800 [ 1359.996445][ T9606] kthread+0x1d4/0x200 [ 1360.000528][ T9606] ret_from_fork+0x1f/0x30 [ 1360.004941][ T9606] [ 1360.007376][ T9606] Reported by Kernel Concurrency Sanitizer on: [ 1360.013567][ T9606] CPU: 1 PID: 9606 Comm: kworker/u4:8 Not tainted 5.5.0-rc1-syzkaller #0 [ 1360.021981][ T9606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.032075][ T9606] Workqueue: events_unbound flush_to_ldisc [ 1360.037902][ T9606] ================================================================== [ 1360.046258][ T9606] Kernel panic - not syncing: panic_on_warn set ... [ 1360.052867][ T9606] CPU: 1 PID: 9606 Comm: kworker/u4:8 Not tainted 5.5.0-rc1-syzkaller #0 [ 1360.061375][ T9606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.071451][ T9606] Workqueue: events_unbound flush_to_ldisc [ 1360.077252][ T9606] Call Trace: [ 1360.080552][ T9606] dump_stack+0x11d/0x181 [ 1360.084887][ T9606] panic+0x210/0x640 [ 1360.088789][ T9606] ? vprintk_func+0x8d/0x140 [ 1360.093405][ T9606] kcsan_report.cold+0xc/0xd [ 1360.098094][ T9606] kcsan_setup_watchpoint+0x3fe/0x460 [ 1360.103475][ T9606] __tsan_read1+0xc2/0x100 [ 1360.107899][ T9606] __process_echoes+0x1cf/0x690 [ 1360.112775][ T9606] n_tty_receive_buf_common+0xe57/0x1b00 [ 1360.118428][ T9606] n_tty_receive_buf2+0x3d/0x60 [ 1360.123294][ T9606] ? n_tty_receive_buf_common+0x1b00/0x1b00 [ 1360.129201][ T9606] tty_ldisc_receive_buf+0x71/0xf0 [ 1360.134345][ T9606] tty_port_default_receive_buf+0x87/0xd0 [ 1360.140073][ T9606] flush_to_ldisc+0x1d5/0x260 [ 1360.144776][ T9606] process_one_work+0x3d4/0x890 [ 1360.149653][ T9606] worker_thread+0xa0/0x800 [ 1360.154163][ T9606] kthread+0x1d4/0x200 [ 1360.158243][ T9606] ? rescuer_thread+0x6a0/0x6a0 [ 1360.163106][ T9606] ? kthread_unpark+0xe0/0xe0 [ 1360.167795][ T9606] ret_from_fork+0x1f/0x30 [ 1360.173702][ T9606] Kernel Offset: disabled [ 1360.178040][ T9606] Rebooting in 86400 seconds..