ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r3, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80002, 0x110) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x80000000, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = getpid() rt_tgsigqueueinfo(r2, 0x0, 0x16, &(0x7f0000000440)={0x1016, 0xaa, 0x4}) ptrace$cont(0x4201, r3, 0x0, 0x540000) ptrace$cont(0x18, 0x0, 0x6, 0x1ff) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, 0x0, 0x0, 0x540000) sendmmsg$unix(r0, &(0x7f0000000a80)=[{&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000340)="4347751dd4be15dbfe878c31041ef499aad8947019134513c2753bcff21522c7f0789f6f4c18a56ad5b9803d2c07e72a5eb902f2e93ccf1fd5eddae4ab6ba376dab4deaa236764cea73ae2e93cf7cfd70058cbffcbcacfecd1bf285a08146aad7dc256bc4c6ea8bd4f4e36cdc3fa63630c40a88b6fcf3ab1b07d68cee0b3a2c88b297ec3dd0743e81c7e3ef9e8e64087098cfa9c7f0343dabf0adca8a75736b0531215fe7c875fef9280c7c4923a7a8332fa6c4984f0ba15366a799eed4ecd320c4f2fd7d33b3bc17cf73728d79e0f41f66adaab9bdf81898f0259a859a827e393cddd291b9df462b72f16481bc18e81a8bd63afde263a41033c57", 0xfb}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="1c00000000000000b715f609105780045c41df7d62e29d0b0dada3516fc7f4f9242a4c7f7e88be649e4916af184c21f6f0f38d81bb0100622085676db060f1dd683cccc466d03fe05c0216", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000500000006289e15", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYBLOB="030d8a47", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000b4"], 0x110, 0x10}], 0x1, 0x20008040) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:20 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x5c4, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={{r2}, 0x8, 0x10000, 0x9}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:20 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0xc0, &(0x7f0000000100)=0xffffffff, 0x0, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x4, 0x7fff) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000200)={0x2, 0xd7, "dbcf02467eb59bef6f489cdd02bddd4a93cef7dee2f07da2a63c32bd3f2d2f33fe2de222ccae8c70bdb425f6745308271236babfbe658a4914b6d77314ca34a51238db4f873525b438c964aa49ba3366135812f74aad0d36e2514daac1b6fca21270097911717813866832470ef718f1229f173e82a3c36b4f07bdd3307518aced78877df6ae8adb463560e3023d14c8ae0255b4e7c70a77e1de42ca90ee188e5599d2757f1131c899e8001310b31f07194ff79afa69c427ee0f83ab904dd2cd0e6c6a5fa7745c29dfc82f25beda24e5d7808ba07cfcdc"}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126d21aeaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1730dd294a18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f29ad588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) clone(0x81000000, &(0x7f0000000000)="1ecfa9cd72a6d271a9771ae4c941077af773bd3aeb69d81160db8231fcc6fa4a06bb63f836dd7261c343e49d637053b4f4ebd4198f8f", &(0x7f0000000080), &(0x7f0000000300), &(0x7f0000000340)="7211a3fae709544560af8ebcacac1884630555c959533d90237a637a9503bd581488782d77340af570eb2bd66d5b9f8000c8c9cd5cbe0c602e61ef6689b57b22dcfafb266d95dcb3ade2096d482524c5317973acceb183415c961dfff603b451786706511830be7a376a76f77e6181a51624816b3fa153076cabf58195c3d5cc0ca425290b522563c8f9078e59d7389e0125be91db40d048183bd9a5d027629ff6c88d32fe71e4182e9e586460e6f1c5f6c84e6ccc08a86673b81a4a") ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:49:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = getpid() signalfd(r1, &(0x7f00000024c0)={[0x200]}, 0x8) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r3, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x7, 0x4) ioctl$BTRFS_IOC_BALANCE(r2, 0x5000940c, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x1000) 07:49:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) r3 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r3, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:20 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x1, 0x390) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f0000000100)={{[], 0x1}, {0xffffffffffffffff}, 0x134, 0x0, 0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)="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", 0x1d7, 0x0, &(0x7f00000004c0)={0x2, 0x11e, {0x1, 0xc, 0x14, "ac171041de9777bf0e4ea14841141ac85383b5f7", 0xfd, "94525ac4290ba1a85caa575780a102249674fedc452419689fcc5b8e868408451d613eb050922c7bb8b1ea964650909ffad200a973ce0ab016fcbf25686757931e4202a7ccea2838dfb0f66b0058297d94917a89f07560a7ac538c83e436d6c2504d30b58eec0c05116f07a210d4822d4179458b9575de2c280996e08cb5c85f37c19378fd2ef163c204f0f62adf0ef93cad6fb33f5b9f22c8e26ec680b88c6880883f0ddae2d992debaa2d7ea6fc1a536feb039ab7fa6c9b2f2e9f95ee7edc8b3b2b0a54fd1e13be276bf232908a839476e9c46e5b5382340476641efd02ea9112ae19cbed133516fd840eb8e648257bce9641a95b9f996955d601ed1"}, 0x72, "224afb8df211599c151c9dbdfb50e128a7bc531129b0fdf255b50bf43de921941619f16c86c8dad33d9ad18a0a6f964bb186fa1571991d43c0de7f9db2720991a65fd537e07d85d7cbd2415e73bb9d619c93df8faafc8911c0b2f35d6446f1c6cf126318bdf5a5bf57f5697f0c935e5ea27c"}, 0x19c}) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r2 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r2, &(0x7f0000002900)='./file0\x00', 0x4) [ 1262.550970][ T1027] loop5: p1 p2 p3 p4 [ 1262.555021][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1262.561016][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1262.569011][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1262.576778][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:23 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r3, &(0x7f0000000140)=[{&(0x7f0000000080)="f564f816f4ecca239001cb029021af8850545ecedbd77ac10142a57e026bba8d5b3b754604211fa108b5f481f60f0f8aa733bc5f121fda501193b562cc0567bce6cead38a02f63b64bb952444004b73952572f0298f7fc58dcc8e1958a7f5db35059a8e7d85f5cf91d93bf11a0ed055cc184f94db8a38789d25b3afeb7ed5f6315e936e87f749dff825f2a1ff16ab06a074504ffa4b3de7542b06d3a482d6bba1331bbd4a47ce6dbd430fa9fc0d9af1aeeb889", 0xb3}], 0x1, 0x5, 0x3ff) r4 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x8, 0x1) sendto$inet6(r4, &(0x7f00000001c0)="69d24ef69b5355a755d6a7d709a1f2a6757324c8849223fd901428bdb214227dfa44ace98afcee4357b8724cb399d67ad8d2416520c8e3d072d0260bb22d19fc15b122f30828584f48774326dfef100ab16e707e54f68511f6561954d1e5dd5b1c50e07da0b3e56035b5dd64d6", 0x6d, 0x20004010, &(0x7f00000002c0)={0xa, 0x3e6, 0x0, @loopback, 0x7de}, 0x1c) 07:49:23 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r2 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r2, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:23 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = syz_io_uring_setup(0x59d8, &(0x7f0000000240), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') syz_io_uring_submit(r6, r7, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8, r9}}, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r10, 0x0) preadv(r10, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x5, 0x0, @fd=r3, 0x5, {0x0, r4}, 0x4, 0x1, 0x1, {0x0, r8, r10}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r11, 0x0) preadv(r11, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:23 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="94"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@remote, 0x78, r1}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={r1, @broadcast, @private=0xa010102}, 0xc) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) 07:49:23 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:23 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cifs\x00', 0x810, &(0x7f0000000100)='\\%#[\'^$},/!\xac-\x00') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r3, 0x0, 0x7) sched_rr_get_interval(r3, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) clone(0x40030000, &(0x7f0000000200)="afb42ac1e3a0816c45eb27430c6eb248eba847da0c3bcd77f41c44adc5c7b278aa07e2b78d3b3e439619acfeb86463f1925a063934591c87d72ae2958e266b2bf8dbf080f65bc50267fbc11790cc8428b0209b9ccdfb126af51638ae4a6a0279086ed7bb10ddd8a55867f251162c7c6192b4ec6706a9ee95c66d6d68ebab26df6f9f87e7a948ab831ab47aeacfbdcdf3468701e28889eea10f889809c0652952913bc11e4b3afb9cf7227949ad99bd6c5317b22e165b6bc15a085c7ba7953fabb4834f45", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="863cd13eb745ab57151298c93acfa806f3b333277e6f75f397ebe474eb6bf8d6a7e3d4b25a8fb17aaf1141ef1eef67dd3b39cf5b5163758a33e41cd0ca261de6e2238ed073a57e962345b6c8d37119d63f2ffbb24592facde53aa59041534ce5b4542996780f1357f8f218c9bbff75dcfa596681129cc3c81482f1e183a23737f119538efa11900d60e55e89fabfdd4d") fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r4, 0x35) 07:49:23 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:23 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000700)={0x0, 0x0, 0x22, 0x3, 0x162}, &(0x7f0000318000/0x1000)=nil, &(0x7f00001a5000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_setup(0x230f, &(0x7f0000000240)={0x0, 0x8e5, 0x4, 0x2, 0x2ce, 0x0, r0}, &(0x7f000066c000/0x3000)=nil, &(0x7f00007b3000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r7 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r7, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r8, 0x0) preadv(r8, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r4, r6, &(0x7f00000007c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@ieee802154={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0102}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000340)}, {&(0x7f0000000380)="4322649061a86ac61fd70bc912450fc477a6edf0b3948c1ab952d3509576475026f1413385242ad5c097fd62609ca43504c1950fe9d170dd8b913f046285a8912406e84e7b6adb8018d4a34fb773439fd7b81969e087d4384a0df875aaf104d5e66fc073acf104c81d85f901b2cfa0fbb26f7671738ba00655c888c95a6800a668323ad430af2c578fe82342b06724a4e205078691cdba8d2aa09822ac64080a94", 0xa1}, {&(0x7f0000000440)="1d99710a24ff38eb96e344f3351535782660410d2d5f5604bb69a7fcfc2ffd4b62d3736aab52cbaa3a22d1ec8dbe778e170f227b3de29dd090ae6754d05484818ef49e8a4165cabdf85c36a57ec5f86da55ebd3b433756447dc32f981b14e8df7faa7e24e7204d3793612ed7d96074a020b16c84e6dfa0bb1eb59d23bf3ea4a61cfca6a39f3943a36ef9c2ad9a0a1947d7f7e6e89748d657d89d5f9e074c5a12684e7b16fe3a07a20f14611bb828173f6224fa05561b471fc8348a56653047e7d6d9b1bfdadaffc42d534756c0f51710af16e74337cf72f5f8b6ce9d31a24044696948a0ff1cf506e90bd366de", 0xed}, {&(0x7f0000000540)="21aac23ae3f1e48d2a7b5c1671968cca8048429fb43d0e970a673775c75feabd2fbeb2097b840880d6218f561fb0e99eb25b19200818973bd72e203616b1c4ef5083de07fafc218a762bdf1af8d5b382aee41a6b026438bda342be15d75bc23c7be3ffa43827546934fcd12c1473d16abc15591be0bba5399db93060257fa8c7a42b75cce888b80032d8581967d8e948282b3ba4d30738", 0x97}, {&(0x7f0000000600)="7cf6eafdd29ea54930bba4d055b33b5cd16d57267c4eff8a635a24ec9096cca3e5fc07fb04aec9a67c61a05ea1077fb7b6a53e1cb979e8ccea19dc61e45964d8f801fd5320fa7b63f46b12ad2b953b74a46e4701299d35d9eba7da3431d3929decd25fc6b22a15d947d4313e21588c919df76cc611f802fc2bdb0f87419c006d1b34ce8a006d5154818cadadb2b8890e3d1ee587d297af3487d08f7485ba50771c41c596215d2952626ee990e1f2a3d7d488695185f49f7cda6def1e3ed1f29bd0c11fff5c444f6971450c9b87e421ac4d53c8b549e0d5ed", 0xd8}], 0x5}}, 0x1) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:23 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00007cd000/0x3000)=nil, 0x3000, 0x100000a, 0x4000010, r0, 0x56b7d000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) [ 1265.485284][ T1027] loop5: p1 p2 p3 p4 [ 1265.490037][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1265.496044][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1265.507297][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1265.515362][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:26 executing program 5: syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x36, &(0x7f0000000400)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff660202251125350"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x17) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) r5 = gettid() tkill(r5, 0x40) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) 07:49:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb5", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:26 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000023c0)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f00000002c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6, 0x5, 0x1f) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:26 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = eventfd(0xa848) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000000)=""/54, 0x36}, {&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/111, 0x6f}], 0x6, 0x7, 0x1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:26 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) io_uring_enter(r0, 0x49f9, 0x3d04, 0x2, &(0x7f0000000100)={[0x3]}, 0x8) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x20400, 0x24, 0x1a}, 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000240)='--\x00', 0x0, r3) ioctl$BTRFS_IOC_GET_FEATURES(r3, 0x80189439, &(0x7f0000000200)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) [ 1268.443963][ T1027] loop5: p1 p2 p3 p4 [ 1268.448249][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1268.454229][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1268.473899][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) [ 1268.492571][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r1 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r1, &(0x7f0000002900)='./file0\x00', 0x4) [ 1268.686091][ T1027] loop5: p1 p2 p3 p4 [ 1268.690237][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1268.696253][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1268.708446][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1268.716203][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:29 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:29 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x1fae, &(0x7f0000000240)={0x0, 0xb86b, 0x4, 0x1, 0x15e, 0x0, r0}, &(0x7f0000137000/0x3000)=nil, &(0x7f0000230000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r8 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r8, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r7, &(0x7f0000000340)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd=r9, 0x0, 0x0, 0x5, 0x0, 0x1, {0x0, r10}}, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x0, 0xd9f, 0x400) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000100)=0x17, 0x4) 07:49:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb5", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIONCLEX(r2, 0x5450) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f00003ab000/0x3000)=nil, 0x3000, 0x1000005, 0x12, r0, 0xcdda5000) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:29 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) statx(r2, &(0x7f0000000000)='./file0\x00', 0x100, 0x100, &(0x7f0000000080)) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1271.658929][ T1027] loop5: p1 p2 p3 p4 [ 1271.663075][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1271.669066][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1271.676507][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1271.683934][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000003a00)=[{{&(0x7f0000000200)=@hci, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/81, 0x51}], 0x2, &(0x7f0000001300)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000002300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002380)=""/177, 0xb1}, {&(0x7f0000000080)=""/19, 0x13}, {&(0x7f0000002440)=""/31, 0x1f}, {&(0x7f0000002480)=""/130, 0x82}, {&(0x7f0000002540)=""/221, 0xdd}, {&(0x7f0000002640)=""/249, 0xf9}, {&(0x7f0000002740)=""/136, 0x88}, {&(0x7f0000002800)=""/29, 0x1d}, {&(0x7f0000002840)=""/243, 0xf3}], 0x9, &(0x7f0000002a00)=""/4096, 0x1000}, 0xf0e}], 0x2, 0x10022, &(0x7f0000003a80)={0x0, 0x989680}) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000003b00)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}, {&(0x7f0000003ac0)="eec7f0083dc4f60130619ab7360e3ac337e12f1c1a5ba717cf8049b3ec90c491ad123d86cd2e6c", 0x27}], 0x5, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x80000, 0x0) ftruncate(r3, 0x731) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x200, 0xe) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:32 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:32 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb5", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x2000, 0x100, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) [ 1274.676325][ T1027] loop5: p1 p2 p3 p4 [ 1274.680360][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1274.686366][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1274.694429][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1274.701940][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:49:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:35 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) setuid(0xee00) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001880)='/proc/thread-self\x00', 0x40, 0x0) r2 = getpid() ptrace(0x10, r2) r3 = fork() perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x8, 0x7, 0x99, 0x8, 0x0, 0x8000, 0x40000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x71, 0x1, @perf_bp={&(0x7f0000000000), 0x7}, 0x10020, 0x4a, 0x11b, 0x9, 0xfffffffffffff800, 0xfffffffa, 0x2}, r3, 0xc, r0, 0xa) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_netdev_private(r4, 0x89f5, &(0x7f0000000080)="c811f252331b330e4536d4973d65094f62284c309530abcc360edad6f10352e911154d58f8691680d5217bac855cb6b89931338fefaf6c38ceeb1f5c5f426ffdcd90ccb04cbe64fdbe76a4fac21e8f4774b81b85506fb8a3f220890d5058d6819ee6fd44b048a1549b215267a9fcd7195bac54a564f8df7449748111921f0e63900e865bfd3ff8c5c80bc516095a13933340d0cd9731df31e75fa1217767829d1dd79d6ecb13524d8f8c207af4a5faddc34b016ac352a1f783523028c82c4f39370e143ca3e09b") r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:35 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000100)=""/33, 0x21}, {&(0x7f0000000240)=""/226, 0xe2}, {&(0x7f00000001c0)=""/1, 0x1}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/188, 0xbc}, {&(0x7f0000001400)=""/251, 0xfb}], 0x6, 0x3, 0xffff) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f000042d000/0x3000)=nil, 0x3000, 0x2000002, 0x40010, r0, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000459000/0x1000)=nil, 0x1000, 0x1, 0x10, r4, 0x10000000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000001680)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r7, 0x0, &(0x7f00000015c0)="c74db681347562ce150ab27439b7cb01c7f6ae7d49caa58074b28f853e2c868f3b34d9bbd728f2c48a84165044b83c0de299b1454c6ec335a94833b4daaf0f55bb5fc0d587ca9ed3f7be0235a19108539cfebec73498aa13ee03423b0ded20df83042a933d2d85d247efad0f6e17a67a3931f44baf1c7ac19362568e54093cddb70d3ba93eeef1141ca580b5277c14538b3e5bca8bafd23c7d3526f9f20db5294d9a33c6996d529d78269a8e0a0b31bfad0b2165ce092fd1bbb1", 0xba, 0xc044, 0x1}, 0x7) 07:49:35 executing program 2: r0 = syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0xb0f7, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="f5", 0x1, 0x2}, {&(0x7f0000000280)="7963d2125f31188d5e002aa77d636a20280650e0a941a10c6b0cc4a169c84df4ba0d5f891ddee13f54b6ab13afe686b479da32c7e481c5d19d47c734461098923080b936e4974012e7292646eab157110c378b341e5f02038d86fa3753b4a3cb51ec67d87f1c7f762fe9ed989e60ba07bac17f6dc7dc45039f016b88902081f1899cfdc03692bba713d783e01547215f4504ab039bbd1560d9fab11678a509632821602eede859dbf63d371fc583ea69ab6536100a197718cdfd7ef96d4e7957cf4dba9a780cba03cd4f9178e1d154d710d221db021f4bf627bf4f369da225b55f815711405c95d4505b96889df956bb52879f5f2e77da", 0xf7, 0x81b9}, {&(0x7f0000000380)="1ed57646fb26aaf9e2a7eddeb6484ceb7700b9c8d064fde1d917ea590e2769140eea22eb4bba7e14207256660c3f4d6bcdcd9ef029646aff10e3ccec34ea50ffadab599cdc25040031acd83dae7712141f74118fdf3812adf0ffc15d4a0d12b5842d67a225aab1953ab0060b3594cd904c19f1e24efe8cbf48d751fc2a0f370d72063b1431b51aaa53d9923dffa2f8d58381", 0x92, 0x4}], 0x52, &(0x7f00000004c0)={[{@uid={'uid', 0x3d, 0xee00}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x67]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x31, 0x70]}}], [{@pcr={'pcr', 0x3d, 0x35}}, {@smackfshat={'smackfshat', 0x3d, ')))/\\+'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@subj_type={'subj_type', 0x3d, '%-'}}]}) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:49:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1277.500327][ T25] audit: type=1400 audit(1618732175.628:339): avc: denied { write } for pid=12300 comm="syz-executor.1" name="task" dev="proc" ino=223358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 1277.526089][ T25] audit: type=1400 audit(1618732175.658:340): avc: denied { add_name } for pid=12300 comm="syz-executor.1" name="12303" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 07:49:35 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x88000, 0x50) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:35 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:35 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1277.552535][ T25] audit: type=1400 audit(1618732175.658:341): avc: denied { create } for pid=12300 comm="syz-executor.1" name="12303" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 07:49:35 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1277.713514][ T1027] loop5: p1 p2 p3 p4 [ 1277.717598][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1277.723562][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1277.731551][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1277.739348][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:49:38 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x90000, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0xffffffc0, 0xa373, 0xcd, 0x5, 0x3, 0x56}) 07:49:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:38 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000100), 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(r3, r6, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000200)="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") ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x7) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x0, @dev={0xac, 0x14, 0x14, 0x3d}, 0x4e20, 0x3, 'nq\x00', 0x0, 0x6, 0x65}, 0x2c) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x3, &(0x7f0000001200)="7dcb39e36cdb4a377d4cc5a8673170430ccec8197be42404c907a3f1c5b9baa30f51b69ca6392f21837593956a534a436ed8137b943a3c91e8823bd458a6b9306bd6b9912fa4bfddc09467fbfd411ac3603aad9fc8129399bcd5ebf2152c8e1d0f4b24bcc7f32180d3067fc21b02e539c6b13085fe7926daca7bfc0fca6c75cd0b9cd080231d23edc7b2601830fda3ae34547dacdfe960edab9114afa1") 07:49:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:38 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x48000, 0xca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0x200, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee01, r3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4f4800000000, 0x4, &(0x7f0000000500)=[{&(0x7f0000000140)="7249ee4a864d7d1986bd6f4b6be2eb8db81cc0aa86c48a241468d193715ea368e9fbf40f418b4f51a0490a9c0498bfb0ae789f7312f51d77a8c61d3f7fc9cd9f4c7adc4ef4bfc3bb3f8c3cfe76e925d873f1eb6e1de8ff2e82ee5a580f36aac011c70c9cbe4871fb3f12f5ba3e9349229dbda3af754af95526a3d3043012ace7406ef0173de83c7c9c0d316741a5e44d9e96168807d3c336c3e2ba5206d13be4b61fb7d11741220eae6f502425af6acdec5ce5c18ec67493cc1ec586b4631191a8613e142cca4f2a90856e80f03bd484741693475530626f8a", 0xd9, 0x2}, {&(0x7f00000002c0)="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", 0xff, 0x4}, {&(0x7f00000003c0)="64a02d2e5b38bb2f92a5bfc7533ca74b25397af7457b7d3ef0f0c79b993ae64a58e3b751285259e7992c3ddea2b55a429384261b0fa33eb62cee9841367a32c345204a4907729a94e4dc7d4cb878427182882a4aa9abfcbbac8d0551f94b801aad5436887ee4d6c4ea1d63ca02691e5ecaff228ce802ce38163b23aca88b701189f32c98a7807a7f628ed8f9d9f8da964c690e2ff2fd1d6bb870afa30bf917d8ba8e7fe677e24c7d00c302b856255e41acba5a7980d575e78b829e68338ed7b9de6798adc906b6dfb0b02e34d9ccc3571f4ff0f6e5425bfdfe227956ec2bf09f221f4000a9ea05d4df4d73080a14", 0xee, 0x9}, {&(0x7f00000004c0)="4f54be2e35e0faa09e863614559b9b401496bd82f21f68c604ce72252882e8816109f61448c577986b7dca5ad3a8ca1b6a2ae70bdd4dad5d2800", 0x3a, 0x4}], 0x4000, &(0x7f0000000580)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@resgid={'resgid'}}], [{@uid_lt={'uid<', r3}}, {@euid_gt={'euid>'}}]}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x20) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000080)={0x26d5, 0x9, 0x4, 0x6, 0x1, "a48899d0ddd257bf"}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r3, 0x0, 0x540000) ptrace$setopts(0x4206, r3, 0x0, 0x10000b) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x2045, @private1, 0x80000000}, 0x1c) r4 = socket$nl_audit(0x10, 0x3, 0x9) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x8010, r4, 0xbcea5000) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1280.530765][T12354] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 07:49:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0xffffffffffffffff, 0x0, 0x2b9) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1280.736872][ T1027] loop5: p1 p2 p3 p4 [ 1280.741042][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1280.747043][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1280.754747][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1280.762134][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:49:41 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000), 0x0, 0x8, 0x401) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:41 executing program 5: r0 = syz_io_uring_setup(0x4f1a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x2a8}, &(0x7f000070c000/0x1000)=nil, &(0x7f000064c000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) mmap(&(0x7f0000260000/0x1000)=nil, 0x1000, 0x0, 0x8010, r0, 0x6c2c6000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x1ba8, &(0x7f0000000240)={0x0, 0xb4f7, 0x1, 0x3, 0x270, 0x0, r4}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39", 0x98}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:41 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r7 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r7, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000100)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index=0x7, 0x8, {0x0, r4}, 0x7f, 0xc, 0x0, {0x0, r8, r9}}, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x1}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1283.584901][ T1027] loop5: p1 p2 p3 p4 [ 1283.593160][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1283.599288][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1283.608217][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1283.616313][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:41 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x400000) mmap(&(0x7f00002c0000/0x1000)=nil, 0x1000, 0x5, 0x100010, r1, 0x3fa1b000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400000, 0x74c8585945612ded) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f0000000600)=[{&(0x7f00000002c0)="0c7f75ec1e603e3495966ef4bf085a85fadca9007e33164a5414f9d61414f567c86ae4666a4c24b177328e00c5a1fc3eb6681825a61efe03725a3e3ab15d3d03f1541495023c84a8a7e1c464d549e8a8bfc13f53dae604b063495cafe1a8be3ee2d1216c7f0aa1ab4d9017ae9bb1e22c1ba3d980962ee552aa9ff1396091ec5281ecbc67fa9ad15f78c7f35836f7534653e48ccc93fcddc33647c5c65ff364a14a2936d051ed64837615e4dea70955f3400fa2a1ddc7cfc59cdd6162636acc66d5dfdd003d52f722870c4ca215ea9a77", 0xd0, 0x3}, {&(0x7f0000000180)="894cad9fbef8b443c7a3a9c77a7fe7af866ca5a8869e4df19a991c90315e48c77d990075ac0da86edec7c2f58c9660818e3f9941d3f5936275a1c9a0041c049313a4dafbf92ef8aad8e16181e23d11756f0fe93430bf5b17fd328ae29229df474c426beb77ae1dab92bb1b4264e71298717a6dafab347d934cb8af3ece84b67503bebcf3c6133b4e1672b3e3b4b47212d6cb0b62a81d9152ccadee8c627742", 0x9f, 0x7fffffff}, {&(0x7f00000003c0)="07e5baf0dada377b7ec4f8fa646a4f13b07f50c5126b84e647baa6723bd003982dfb01a0ead52618bf56f60618693a26fa5ecaeb5930b4275d3ed32b8452ce4702261a5826bdc45ff779c4606fef8db8760e53474562fe9d60c7081dce9fc3358469eadbbb70a1a0f95d01e7288a31c5088aba3e4dd001bdd0102891379701d4874b74bd210363ffe226809eb805d78b2976b7b6489e81d1cf7089504fe5b221", 0xa0, 0xd09}, {&(0x7f0000000480)="06ebb06d52b236898d5dca02d32c6f39f9f5d84138a7dde868099c605ecba07d5c6fab7cdb3a6951d2baee20e08afcf093b053cbcb4e9fcb2e9c5d2fc3ea0b9a2db1b2cf6dc148f21bb361e8cbbc66eac4e177bd12f81a379254f6af9bf32aa30135965df902566ffedf97f8d83aedd80232acc1a852040494e5c84f", 0x7c, 0x8}, {&(0x7f0000000500)="84b8ab58ef3b557bd0d9d67c09b3a6e7c1287809cc7f366a63d25f75ed5582c73635fb63a6ff9aef54a21709976afec001dcdf3963caba41e0345d1628ba6054c6f2098868f5b7", 0x47, 0xff}, {&(0x7f0000000580)="1beed31031c18a903b348534e6f5073941ecf41597ee169be8d2299bc087e20122d13d610853b8f49b96a358dcbd2c663a8029ed25f4162beb9448b4f31bc5e365b11955e050", 0x46, 0x3}], 0x800, &(0x7f00000006c0)={[{@usrjquota='usrjquota='}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@sb={'sb', 0x3d, 0x1}}, {@init_itable='init_itable'}, {@minixdf='minixdf'}, {@noload='noload'}], [{@pcr={'pcr', 0x3d, 0x19}}]}) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x10000204) [ 1283.856496][ T1027] loop5: p1 p2 p3 p4 [ 1283.860849][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1283.866846][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1283.874286][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1283.882009][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:49:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:44 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x400000) mmap(&(0x7f00002c0000/0x1000)=nil, 0x1000, 0x5, 0x100010, r1, 0x3fa1b000) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400000, 0x74c8585945612ded) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f0000000600)=[{&(0x7f00000002c0)="0c7f75ec1e603e3495966ef4bf085a85fadca9007e33164a5414f9d61414f567c86ae4666a4c24b177328e00c5a1fc3eb6681825a61efe03725a3e3ab15d3d03f1541495023c84a8a7e1c464d549e8a8bfc13f53dae604b063495cafe1a8be3ee2d1216c7f0aa1ab4d9017ae9bb1e22c1ba3d980962ee552aa9ff1396091ec5281ecbc67fa9ad15f78c7f35836f7534653e48ccc93fcddc33647c5c65ff364a14a2936d051ed64837615e4dea70955f3400fa2a1ddc7cfc59cdd6162636acc66d5dfdd003d52f722870c4ca215ea9a77", 0xd0, 0x3}, {&(0x7f0000000180)="894cad9fbef8b443c7a3a9c77a7fe7af866ca5a8869e4df19a991c90315e48c77d990075ac0da86edec7c2f58c9660818e3f9941d3f5936275a1c9a0041c049313a4dafbf92ef8aad8e16181e23d11756f0fe93430bf5b17fd328ae29229df474c426beb77ae1dab92bb1b4264e71298717a6dafab347d934cb8af3ece84b67503bebcf3c6133b4e1672b3e3b4b47212d6cb0b62a81d9152ccadee8c627742", 0x9f, 0x7fffffff}, {&(0x7f00000003c0)="07e5baf0dada377b7ec4f8fa646a4f13b07f50c5126b84e647baa6723bd003982dfb01a0ead52618bf56f60618693a26fa5ecaeb5930b4275d3ed32b8452ce4702261a5826bdc45ff779c4606fef8db8760e53474562fe9d60c7081dce9fc3358469eadbbb70a1a0f95d01e7288a31c5088aba3e4dd001bdd0102891379701d4874b74bd210363ffe226809eb805d78b2976b7b6489e81d1cf7089504fe5b221", 0xa0, 0xd09}, {&(0x7f0000000480)="06ebb06d52b236898d5dca02d32c6f39f9f5d84138a7dde868099c605ecba07d5c6fab7cdb3a6951d2baee20e08afcf093b053cbcb4e9fcb2e9c5d2fc3ea0b9a2db1b2cf6dc148f21bb361e8cbbc66eac4e177bd12f81a379254f6af9bf32aa30135965df902566ffedf97f8d83aedd80232acc1a852040494e5c84f", 0x7c, 0x8}, {&(0x7f0000000500)="84b8ab58ef3b557bd0d9d67c09b3a6e7c1287809cc7f366a63d25f75ed5582c73635fb63a6ff9aef54a21709976afec001dcdf3963caba41e0345d1628ba6054c6f2098868f5b7", 0x47, 0xff}, {&(0x7f0000000580)="1beed31031c18a903b348534e6f5073941ecf41597ee169be8d2299bc087e20122d13d610853b8f49b96a358dcbd2c663a8029ed25f4162beb9448b4f31bc5e365b11955e050", 0x46, 0x3}], 0x800, &(0x7f00000006c0)={[{@usrjquota='usrjquota='}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@sb={'sb', 0x3d, 0x1}}, {@init_itable='init_itable'}, {@minixdf='minixdf'}, {@noload='noload'}], [{@pcr={'pcr', 0x3d, 0x19}}]}) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x10000204) 07:49:44 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x71be, &(0x7f0000000240)={0x0, 0x90fb, 0x4, 0x0, 0x219}, &(0x7f00002ae000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000001c0)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000300)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), 0x0, 0x0, 0x1, {0x0, r5}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f63", 0xb1}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000002500)='ext3\x00', &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:44 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000), 0x0, 0x8, 0x401) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:44 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000002540)='./file0\x00', 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:44 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r3, 0xf8065000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r5, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000005940)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000200)="eb822cf9822a2a99a28e73d2f40f46f76d39f00ab622602e460798627ecaf6c071e6280b085c4b2dd5b18900ad36f236943238129dfda147ef8bc456be90cd7a72133cedbf60a71da9d77d9c07b4ad7a5c060795328653dd868a355915496d0dbae51983215c1f503fdce2e1910672c3d0cc8760efb669290854a310aab23ee3adc2ae720a1769ffe535c841ae8c636d2ca4dd3cf64d3418f4a8e4f33e1ea6a8c8b93e707c7fe94e7ca79cbd95df0122b60cec2c", 0xb4}, {&(0x7f00000002c0)="19aba6b2d094c953fb31c091df062171a7b7095eab57afaebe2c7ee258b7a5c533eab801d5108ee79e20c91dc2d8868f1806255bfb2f6292f3b856710486ac4bddcaadbe68", 0x45}, {&(0x7f0000000340)="83d74f4f94b3cc049d2bac5d59623951d45652b03f84ed620a4f6488dfb3a104158dd5a402345dc7e1252559707e53bf4e6927e566b558f5a429f2c83a6038d3f9cd90ca61c2fa97b375a6209680c1531b4086e6278d7766a1aaf3e01ddd7a8b109c78af4b98fc643740bbe5db354118da5b8f2460706f6de5d3ecd3c6fd69a1b5923f3491049c703d808f2a0b982ddd620c3e07217d89874f10bf8326f1cf804c047cd2a3da88ba6ff653e247c4a6cf3209ff2f098cbcd68a2086b8d7993e91ad793fa21fc45e2c20184fb0d084", 0xce}, {&(0x7f0000000000)="f2fd4edfbe8d94c2d9ceefec802ef8c2dbdb41a3898b65de33b39e09", 0x1c}, {&(0x7f0000000440)="39b538a6a6bf315d0b7993dccc77f3ab1a5bb6ef8a013daa5bc07d03ed4067efec9fcf3ebc024cb795e74f9767f0cb196eaabff75336190b5e6ea6f4ca84f49b267d09f83bb95c9f04a8b052ada48cc37d8f08326cf7403c7c33642078f44bd28982cdecd70a950265f60850", 0x6c}, {&(0x7f00000004c0)="753e9e6c7f6951b81008301ec6d42d2372f84a8d83656ef92aab3ed81d63a62c0289c0849a2dbdbc9c43975ced81fdef9f36e8cb52d18fa5e360c845e6e99c66a74f76482bc68225a631268d5c8ada9f4add530c120429", 0x57}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="744abfd297ba3d96fb9a89f088203e80e1929ccddf5fa4b9d29fdbe484db549a299bdf9b08f76d4b4ac461a721ce2b7fddbe5b38a9baf0394414386ecb124225daff4be0b4d7950d0c2253203d1f3daf439fc9b574a3ac7913eedefb80a5979e4f504018742b2fa9ff65d0daf9cca770dc637e59076859d0711bd15eb024f874b4cef0926721f9bb12ab49cc2104b78f703ec105ac987632c44f18efa7b0463648770341dc35974d3654768af21febb637135f266df148174b4bfb561fbd0a317f038602a8705cc2d4fcf9abf08b50ff852833ebf46d975fa10820c56ebce80dd2d5f833ceb72558509c8470fe9f08b7032153", 0xf3}, {&(0x7f0000001640)="0c577a28fc6d4100bc444922e4eb40f73ad328f63ce133cf1dfa77debafc76c2d01a1336cb32e20c68a12161506ae0aaf2f3cd9c6fdc8af87b7bec63fda1ec0404f64f542d19c339375651955acdda5a08c47e108fb5cc97691e545311f5db605b79a7f5c0bf300bcb7caa722ab1c47ca97b75691e295a1191de77653374b56b91a3e48a4cb64c9189d73a49dfe1acfb4d658e0c2e509d9b4f588a26df74b0d418fe12525a2cfd05362dfbfea9bdc0d5f09514acee63796eefd88a908bcd1551122968311490234bfdaa198a65f273f8b78ca0f1ef46d7d1ba6df8db5e3f305b656c4d65cdb7653b63b4", 0xea}, {&(0x7f0000000080)="86a0983b1e28254def0b9c51279b480ad3ab5170d231b97eb6e522f1b2627333b6935f9556f7d2af800306e5321a982722b1b8377fda42397cd2a370", 0x3c}], 0xa, &(0x7f0000001800)=[@mark={{0x14, 0x1, 0x24, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x7285f2d1}}], 0x30}}, {{&(0x7f0000001840)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000001d80)=[{&(0x7f00000018c0)="db9d745b9bd7c51c564d461cc18645077799093b3d1a5ffe18db93d100bfebb0bd178add681426a8b019f6571330e549e06e8bac0e4740091169367b1b504ea304aeabba7956013b6c22b6db6746316d85771167969681899b9c359279c77bfa62e0c12a57d506934c45e225216572974c3bb57accc43c6219b84f0384f2a86e08110c3e28cba9fff845fb128e390c0d5dcbbbd90e97e36d5accc928a7724f9f6bd0466e3ce96dc660291777189731eebb1dcad3f20296e81f16cbff6e4014f49f52d39a9e9e8ae709429fa627a74471d6d0d929c6c199a1a7dc77e0a2f328cf3e0d376536a19bcf920d7a0b7cd3", 0xee}, {&(0x7f00000019c0)="22a3f5b45bc075", 0x7}, {&(0x7f0000001a00)="da47b7b4f2d13a637bc040debac94ccadc0385ec318de354777def1f260762a4c145bef3870733dd535d22059ff552aebcc83da01e7fdb1102bc22109d6b80330a8ddf63c855480fad0e5fb120b4045d04188a2dd99b8029971e77f8ed3f7019052f955ff4a7bdce63fcf0645ce3a461b4a2097c4792cbfe157d69cbe2f4a8be891ae125a3a318b760ecf675799a0ae7c46da31c037f9aef83a45c405e6a8ae8e09cdaef589fe6a3f623ee799069a8325734d6c2ed3bbb28d0941c5e1d9a792829c972c42ff4f24ac5d19cbf56bd10ace0ac5ca38e628f2a5e2a296ba0381b6b08d83b3867bc", 0xe6}, {&(0x7f0000001b00)="b32cb30d9a5e6817d1913a00a1f87b304095e0cb2bf87ac871498a52656ad6e585f0e1610e16380fff94a7c08f2361fec4ca14890b391ffb96823bd1537f96b6ebb0a5b3869cb99c94f53ef78ded66f8ec8544b6572cd289fe02b973c2ef6639d73c909224a3bfcaf911f4b51eff335858f971d893406b5d804a7808760fdcc56ee3934f3b868dda8c759cd68eb1f80b7d5bee7c38777662738eb93a5e1ca9672aa4117bfcebffd2b9002a05112ec5c6a72dff86e3d0860215bb4620b12b5568daa598ad8120655026cd4874d0b04e398da577152d9e3aab1eb0d025cdfde57fa59bb0aa637c9f4a8e3c0a116aa96d168a86", 0xf2}, {&(0x7f0000001c00)="0d1431d355cbaca06fce532ad32964e5332dfa41e449953278ad898a969a0ed963870f892031a6d1e767b81aae5b41f5426f925fa238466f303dc9e71cd80178da15a64f1489471362bd009d4fb11dccabdf47a3daf312a22ca85c7785524c8ffd7c5b90bcc47c05c5529c9a8755d7c4d2384e5cec2cc19566e51a9498b26bac0b7d0782ae03c5ef817bf39937b33a255d1c6fe36d7b05ebca8759b48e0a9ab2e048d2997ffda30a6c04562d82fbe3cee7343ea014ac3916701e658a3a417cfc2ff5", 0xc2}, {&(0x7f0000001d00)="c9804e21dcd426584db38b40d49e8c4294e1a0dbc373dfd393d81e9a", 0x1c}, {&(0x7f0000001d40)}], 0x7, &(0x7f0000001e00)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffff00000001}}], 0x48}}, {{&(0x7f0000005d00)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001f00)="09590d00ff542baad181d4ef584b478ff373b06a3293eecd13c9d4303de97cd56ed1", 0x22}, {&(0x7f0000001f40)="03b60bbbbce54c0d6d61f9b7fbd478cbf6ba1e6b390523d22c39b9f60f65a772961125bac203", 0x26}], 0x2}}, {{&(0x7f0000001fc0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002040)="92ecabf7144dedcbbd657480f692327a5280cf3e9aaa98e63e922b6b4b6b0a76f9c181e41a7c9c296f93e9", 0x2b}, {&(0x7f0000002080)="beadc1bf744459b2f11e3fcf858281720a5a4190366b7ddcc8d7768b907064f0db72385310a170324159876f297caaf6a21bcd651fbcfaee9fa6d2e780817a", 0x3f}], 0x2, &(0x7f0000002100), 0x48}}, {{&(0x7f0000002180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002200)="a12aaa90a6176d3ad230f1c56b6ed6567f9a333d07faec7a8f52f4bfbb56b9f1dcefe9b0870c86e225b1ade63c1a0f0a769cf8ce194817b3b4541d39971da50e9aca0ffc76ef1954a1f1b7d96cb671db", 0x50}, {&(0x7f0000002280)="5d9784222e735968f9750f343cd6a6d080951fc835a325568d18cfa0425ca591ebbb526dd51e6632f49ccc71742894a6a9f2233a6b5032069e6e1e718e4ddb3910408ebc47c23fd0f94dd02daec369353387e377719b978b6a90267182f5a7511d8f70ca8d6a538bfc8ce531e1fb2ddff9f75ca7d18db3c70d", 0x79}, {&(0x7f0000002300)="7c50e30dfe783149fc2549efcc1f6e1b1cd60e973e8e54877a709dc37c9da36cc169fb75146c82d3553e0f6681c2650b36d578d656c0610dd5aea67e0e32082566bca681d813a2fb3c21076f91d918a8ecc69e", 0x53}, {&(0x7f0000002380)="4877e8a984dfa6dc84d70713b8c31008d5c01123fa503a29d0fbb0e6390fd8a1ac20364edbea03bf5a0dd7adad1538ed784ad3e3f4ce6c74631862a77da962ce15297550791394ad55bd5e5fdf00dd809574f3e075a62a7c701ae7d24f194156eee65ca231300724d9b6ee4a97651dad1926f0770befeb", 0x77}, {&(0x7f0000002400)="d28804d70d880c8476652e79d61c1ffd6667b9799adbfa7a8997555a8f5d331348c0b78f7b267e5a03c61e0b0ed8ce9417fe1b8968248a4952c8a201b4d956f2c8fc46763f79cab1193bbff387b35d004688227aa2b48816085f8a1a60a60c365513ea3b33c12d42479a97c258a0023490b856ebe0b002f144402c8346e6a993b6d621965c4a4bf50bdd9139", 0x8c}, {&(0x7f00000024c0)="87d2697094a1da45ae97a5a4737f4daf6b57898eed91a839b5b308c14f393f73dbec2d876b664bc47b7fe1c38df5851babae02573ebc505bb21d04d4b93adb4bb998fcdbbab05cbb8fb8c84539ceea6647994d488f87e9077799a48d5ce3448c", 0x60}], 0x6, &(0x7f00000025c0)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0xfffffffffffffe36, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x48}}, {{&(0x7f0000002640)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'vlan1\x00'}}, 0x80, &(0x7f00000039c0)=[{&(0x7f00000026c0)="d30c38390fbaa32f1eaeede3725efe766fee52a24bce94537869f912a8db4a42bdaba5c57c8c5ef69985ce4170d34ae53fa43556b6cd351274590cb84058e00bc4b0bd5501852cfab1a0eaf5ab86178e2cfd6407caa38cbbac9b2694", 0x5c}, {&(0x7f0000002740)="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", 0x1000}, {&(0x7f0000003740)="d2134ad55c4413a4324612e1d4c5c9dcf9eed7d9580d460028ad4b90e592932b7df57d0a87a4384d3531beb2e784bef471afdc75fbcd4ea6b3c697835cc9fd0037528f645cde3f564950d7600283e31c9f7369ec36210b30d05aa8ac0c01d762a6cf13bd491296baf5053c437308cac384c13964d3a9c280817bf9b48adc156c6dcfdf563fd8271d9ce461229b971012533e048e09567a2923e391fd", 0x9c}, {&(0x7f0000003800)="4821b71d6cf58ac76d7f7b4a32f4a5ba7a647e7b80e27e5d3f2e8858971368c20d78a3a7705356d182b240d8f3289b6ea1cd2e24b11b8911a5f2d61afc4fae1646b51dca21b8a55f14abf813f9dbb87e96fa62133a1e135e434289aa3e3e27342c71f1eda2b2f87cc1288361a164d220aa933f81480d2493d7cfb69f4c6a12c44afc09c078eb486fff2439ad0e0b17ba251f5ab1f335fb5cd3cf6c441b124aa0294beaae53d0c33d64c9a319fd72d5767ae81474e25d014a5c05a69d3b", 0xbd}, {&(0x7f00000038c0)="4bef04b5fa6a0560bf09ebe8e2e52b620ef782fee267cb1f8598eb82f009480aeef9194288d295e81bf54e0b4bf3886f7dd4269aea8be22c67e1c18fe6e48e12492baef4314dcdff882c6831b226972f10dac72fbd851b2f0dd9f92e79ac1bd50e0b31929555989e65765142883dcf552c6f7392035739c5752a06961f96549e1deeff7a39803de4e73f4d2028b3316a6d79", 0x92}, {&(0x7f0000003980)="203eff1b51fcb53c88ba10af5f26a0358f9ff46667d5608bcd862e0d461ab4942f0852d10f10727b5c65d505", 0x2c}], 0x6, &(0x7f0000003a40)=[@timestamping={{0x14, 0x1, 0x25, 0xffff5369}}], 0x18}}, {{&(0x7f0000003a80)=@phonet={0x23, 0x8, 0x4, 0x2}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003b00)="6b73f4104d8856271554abe5109ae62785439a8e632a95382a86732c72498e32ead12671a67da217887200fd468c3ac6dd0e07b005886c557bcd747857df04758c86879f1854b6569e6a75c73d7b9dd58f3d55", 0x53}, {&(0x7f0000003b80)="e18cd16814f089a6cf638bf6c8cb3975b8b9229269c7aab1bd959b2a5258fed0e2d4143db4fefad6e0ee8478d01bd52413153ca18177df59d04495653f17181fe07006cc64533bc2fb4ec9d1db7f57625a8b2831b7a767f15bf28e8390fa6707cad14b539b70798b2497e52eb7e8ac7f979c2fa9e14234742ddaa682b3ecdf22eec06d74f39094a7b1ee8b08eb008a0512e7049a17cb06a33425f356", 0x9c}, {&(0x7f0000003c40)="253431e62bdbf16184ddac72f30274670cef94e988eaacf8cf5be88e898652548f120165537ce011828cd4c9383c174f8baef6da8e5993d705890f7af8f6b94876", 0x41}, {&(0x7f0000003cc0)="f285c5484295fa3fc85777b029c21a6487e42f9d7739b669c181e473e7c1fb71b0b416f189664c295f019385053ffa8a433d8b6a72bb4446e8f813283e1c56f455fcfc139ab67390052fb21807bbcab7f969170cf258ded1ec44efa16d10960646ea8c66", 0x64}, {&(0x7f0000003d40)="cc67fb27330d6eecbbf955d4d010e8953955b3", 0x13}, {&(0x7f0000003d80)="24e9710dbfc9f1929f5023dc519083946ffc8371ebcb81545354556b4ae7f58579c515dcc4b75140a6c070fc1b515155743048aa4349bc041a", 0x39}, {&(0x7f0000003dc0)="42b076b50ba8079aefb5e8f5a3ae5e7494b6338073545a9a5c465edbfd16d99332028fb908a4d07143fb5c57f6fb1d1d297bb9bb65738c33d9aaee589c4168f8408ee85f9c207236f32f99d847c459b4942a176060116f3e0d54852993d057531cb76f30196e4c92e9ba2872caa5295dd1ce6dca0fd64f1d96c5b1d7b0ec8fc4ed64bd1a3e6981fd70afd5f8a4a6156c599e91ca56a4c9f55342884d60938197b5353a855d37982c71c0f61067e564588b5c4358c4ae007b0e270704ae0251228838c4149a3f54d0e9df7b9f74748c0121ed7ea0f2467bdbd56a7aae283a7b75354f60", 0xe3}, {&(0x7f0000003ec0)="393870e5a16142d8cc25871f0b089ab5679754a31022843b25af14337132c67afdadfe7f0bb852e414cc639a12d04034d9bf4257a644e83131ef6ffcbefe51bea7f50ad6d18372e345907bdf812655384eb1b477708a329c7ed10a089ea77cd3e780c36e529f46284954f9cb94fa46a0bb8a02f9d2cdfd3b1b2b00d64f4b91473c4b2f6e", 0x84}], 0x8, &(0x7f0000004000)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @txtime={{0x18, 0x1, 0x3d, 0x42c8}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffe}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x4f}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0xd8}}, {{&(0x7f0000004100)=@nfc={0x27, 0x1, 0x0, 0x5}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004180)="53355eb492", 0x5}, {&(0x7f00000041c0)="50d86252b50e3e040f2582915c545136e4ba5c8415492b9af7e69c78d8e8043021b83fab284d561b301f7da24f7cd8fa3f13c41015288d1c9fa1fc5123ba7c843551a321d74741df1e82745281ce90f44e8b3ac8d54ad337bab242998833e946950b0d837ff3902efad53093c08c", 0x6e}, {&(0x7f0000004240)="c74e8f787064faec6a14126906b8164aa39999225c5e13d8c47e2bc97f726ce3380b8c046f80a0a34e3bab3febef757b5cafafe23356c39fece199918e49d579af99f75b573ccc0494743a319b39807f7876592c69e1c4f359a70377ec00e47e1472645ac59c8c8c834feb092b20fc2361d432ff3d0175d77cf8a4a340c518ee9ff378907f96786bec54a737848101d6ef2e78b3a9c953dba353f47a43d6615ae09c50f772287c6e9123f341324cf6ddf927b522a602813fc1dcefbb603665c4a350f5e063d3b452c94cef62468d3fdfa36c506d588151", 0xd7}], 0x3}}, {{&(0x7f0000004380)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x80, &(0x7f0000005780)=[{&(0x7f0000004400)="1e72535d32fc6e0468da8d5bb553ebc57d368d170303e11280108143d2df58f9b2330ea07862ed6dfda4ecd5af8379ffb0530168b679283c517053adcd948e248ed6727cabd538c551f8056e271740c0d47c0d7e02e62fd7a7ad4b1faca131a88247e1ec706311bcb9be4014d6dd7e9204524629b2a1266c1cfd498161ca115d97dbd96a72c98b470cc8686b2feec0e32d470e52e5dcf81d373e8cd408868893bd13c727137ca29b1eb3f9bbfc54de5a7b63229389c107dc5a06a0df9e112995c7056f509cc18082db7fab798da7de3a95666cb53bf59155157b064d", 0xdc}, {&(0x7f0000004500)="203bd610978b407e7e05217c605b3f6073761146a7fe9a7653108688a94fb15ed5872854af092a990f03e9d9283a98a06c01a104afb1833352bfc55ea3a5e1ede2ac1aae6500083403cac0bbaa9029fb89192fd65d1d515c2c81c2b501fe3ca019a0aca5242233fe5d8df591", 0x6c}, {&(0x7f0000004580)="73ada60228f34a3bca86518bc1da", 0xe}, {&(0x7f00000045c0)="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", 0x1000}, {&(0x7f00000055c0)="0c7f168099363d02544fbdaa6335b67221cb96340a72640cc25f9ddf8c162779ac58da61ee2f3402b8497709a5ab23e47acaec2a5c4514af78d50fe3e47500f0e1a9a149bb77bb73c78168596dc130fbff7ac2fc7cc212d2a350c598e041bd5f0d9657f4d228690b19d029c759daca05d4986ef8b4c550227d0d075345a1efe7", 0x80}, {&(0x7f0000005640)="b5ed2fcd5d656a65f20be1e98acdd7ff924e288a8b93f64f1339e9bee9d2764956b05691405480bb2523333e98b1ac5f140e9eee625df3401518e517255cc29aa9d8f155e03264bf041383a2a505193a9f21a4c7cd94baac3548407171aebdba65e65f91b9a5ea1776e3861e2184a7c557be96cd4bdcc5d8af12cc35b5f0c4a462f5b88b47a30b33b2e28c8edd4cce89b0578c593b532c3716436d61eec16266d35f10e74c623d9ac0bf5a0160cb914ec0f41f5f75cbb8fe2e4c996e19a4a37e660fa64d0de2115f82a0b7e76f776456a3b34f99be1df800502d", 0xda}, {&(0x7f0000005740)}], 0x7, &(0x7f0000005800)=[@mark={{0x14, 0x1, 0x24, 0x1}}], 0x18}}, {{0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000005840)="2ad55765c99d127ec650a7658dbf4737ada92624646a04e563090f4c771d70d6b50f03a6d72cc1c4e94749807306d2c89f59", 0x32}], 0x1, &(0x7f00000058c0)=[@mark={{0x14, 0x1, 0x24, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x48}}], 0xa, 0x24040081) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x41) ptrace$setregs(0xf, r2, 0x3, &(0x7f0000005c80)="c186a291cc4a075b643cef02d0cedab566020c905906f7cbd86aba8c36d1f2dcd71a93f280333794a06396a2e811e3a2e62094be8f05f075a116c8677428bd427487116294411f559e47664edb5e") mmap(&(0x7f0000694000/0x7000)=nil, 0x7000, 0x2000007, 0x4000010, r0, 0xccede000) wait4(r2, 0x0, 0x4, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) sendmsg$inet(r0, &(0x7f0000006400)={&(0x7f0000001e80)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000006140)=[{&(0x7f0000005d80)="c53a4379a91c69022a5260c40ef0cd4c1932ed1ca0a0a3c9bf9bbf9b90f7ef5bbc39f79a6dd7b5442b6336a2bd18ea2792066c4cbf555b01a8810c5f403426fba633e63c0776133415b22ba03791f2f2a1e5956d78ed8639cabac29a8571530676b884c2783e3d7c342ca61a44f1e6d1e7d2495b0ddefd8c05dbbef86a4b44e7eecf77697cf2bad72bbc4b36984dbbccd984c0ccf2795f67fd2677ed3da1d0137be03efb1048a3e23c3b55aac90106f59ede380745a290bf9b4f84bad5b8dcb415675f517e00964adfd6460874e01d85ab8dbf2a62fe74c1d2e1d75b97ddb26987f2df9e4c7480da048ec8d00ab7f5380599a921", 0xf4}, {&(0x7f00000061c0)="4441aa9d89da7b36a75828fe20b65b9847c22a75ea72904b04262a60bb9f52a40e933d094f113fe3c19a94a0f6448c1ac4b2ece7f000144eda45b41b2ccc1672aa555ee785674d65f3e5d826924fa1d89988a63319ae01bbc88d727dee976bb20337e58006559e93fe83faec8d38505840c6018bb5765c8be6f8f7ebbb5618a2d31e1c3d89bd2b127b9076d839d1aef4c6f37a4040fe578a682dda93162b70142bbff433ffb544aac76b1de5a764acfc11372b04f9b52006535bd33af9bcefc5f67f8198ad4e039b5db55d79000000", 0xcf}, {&(0x7f0000001ec0)="dfd25649831097be1a3a2126061b2d15beb9ea7182584b5c74b7d2868b77365db789ab4b6fcecce0002293352a482f4d2d87ea7c978643a5c1c01f", 0x3b}, {&(0x7f0000005f40)="0f3f62a44b61ec94921836ccddcb5d706577a84b88a0d401d17a23ae8d56ae", 0x1f}, {&(0x7f0000005f80)="f37024301dab848edf17fd12b65779a9eb7ff8fda46d9f88326372dc557f801f5d66c8b044dc60a482741fe5661296c0c08d2f9d2c28f42b7bc07dd5a25dc992a510c59d910ae8b45aa7624402839813707a8d4ffc84fcf44ce7982bc7a7bae766c66fe67594910e02daec1765259f4b1ff58003d0eb260a016ddd5597a98ff622ebad3170168d2edb1918", 0x8b}, {&(0x7f0000006040)="1cac66b74820f09159920c5dce3755bffba2a853a481fdc3978f2caf9c4800da44b062da798930bf170dd14f4fd352a653bf08b15ad006efd039e2ae828d4825fca7b0bd0063cf31470b1d7d57c0db458d2133ff6fbdc5f39421a34dc5fada4e895a8449931ad9551184d20df89a179408b23274250c61a0f44ad98babb4cd9bfe975b07eb046e19bbcc31c154386860217bb0e01ed736acb24219f2fe", 0x9d}, {&(0x7f0000006100)="5438fc127b2f10965a613bcd54f62c", 0xf}], 0x7, &(0x7f0000006300)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}], 0xc8}, 0x2004c840) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001d40)=0x0) wait4(r3, &(0x7f0000005740), 0x1000000, &(0x7f0000005bc0)) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1286.847820][ T1027] loop5: p1 p2 p3 p4 [ 1286.851889][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1286.857880][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1286.865779][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1286.873221][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:49:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x5, &(0x7f0000000600)="2272fd9f6f7ac5a77c7fb402dc3fea2ca57c974c6c02c94351f1c4a5c5814c583dcc5d2b3786a2ed20e40b810842b936fdc5ce25ce6213039c9b79b9068b76df6889c93102c79c7a906d35446783f472dcef4d00bc") ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) getpid() 07:49:47 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r3, 0xf8065000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r5, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f63", 0xb1}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:47 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast2, @private2={0xfc, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x2c}, 0x101, 0x20, 0x4000, 0x0, 0x9, 0x8}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r5 = signalfd4(r4, &(0x7f00000014c0)={[0x64d]}, 0x8, 0x80800) sendto$inet6(r5, &(0x7f00000015c0)="a658c68d6db61a3cd53a2391db3006671ae6311e6bb762067a31f7bf03179dfafb8d8b0a622bec3ff7629a1117712348b2fcca3ced30837255469884e5fff495da6e1c64bdd8841a66bc1746896e6fab671a1a036ce22d7c0b4b1f88cd3397def5", 0x61, 0x44005, &(0x7f0000001640)={0xa, 0x4e24, 0x0, @private2, 0x1}, 0x1c) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0xe44, &(0x7f0000001540)={0x0, 0x3118, 0x2, 0x3, 0xea, 0x0, r0}, &(0x7f0000790000/0x1000)=nil, &(0x7f0000580000/0x2000)=nil, &(0x7f0000000000), &(0x7f00000001c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_RM_DEV_V2(r4, 0x5000943a, &(0x7f00000004c0)={{r6}, r7, 0x8, @unused=[0x6, 0x0, 0x9, 0x3ff], @subvolid=0x7fffffff}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x7, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:47 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r3, 0xf8065000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r5, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000027c0)=[{&(0x7f0000002580)="417af2ab1d7b0907afff0bd51be0f1cc983ac18daa5b1d289f2424e637dcd9282517dccd759317639b9dffc3950812fbbc357c386609552328f27696ad223a3597e3356b3eac9e296ec0f7315ded539e4a9f67e13ee2faa50a3a6b00fa521e99516a4f1f1323c56eeee27ac8bcc3", 0x6e, 0x4}, {&(0x7f0000002600)="eef30660440da22db4cf4207472f0cf87d1bffbb82cc056b959180ef51b35fd834626281db512dd38180f5d41e4bf308a2588b53bacdeedb40418419d6aa988686c1ab89f60ebea9524d16599cf6101dfa05e67f10e97e8256824e9038b885a1800d0c3ae96292f72eec824864429496a99a11ccc89d5256135c8887c34597a51c1644284c4f18e034b252eadd35b7386f2e030d357ccc0d5103d9a174ef4d70c0b05c88d5b3531c161238d5702cfb68d9", 0xb1, 0x5}, {&(0x7f00000026c0)="261589be0ff61e3da6c6e5ca0447fed0f563c72a5851fc7bf2c9656ca0d3df895187cb7714d4a989fbe5bdda2fbe8ed44b90fdd94f5d040e33db4dd195f069185620d618687154", 0x47, 0x2f12}, {&(0x7f0000002740)="8b01ccd574ecb72889c07aee860d20c51965b6f94cdbdb0824591f5bed310fca74b01c5d00ff272af3bb8ce823bd526e8871f0711908bd214e70c080c484a0e2f457a6e9ecdce924bb910de9ea1b0c97554d4601c0b74026c3539aeef59d4cb28be5467d39ca55e56e72823e", 0x6c, 0x4}], 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:47 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r4, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1289.805701][ T1027] loop5: p1 p2 p3 p4 [ 1289.809746][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1289.815723][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1289.823617][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1289.831211][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:49:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:50 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:50 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040)={0x0, 0x0, 0x8}, &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x4420, &(0x7f0000000180)={0x0, 0xb736, 0x0, 0x2, 0xbe, 0x0, r0}, &(0x7f0000135000/0x1000)=nil, &(0x7f000055a000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) syz_io_uring_submit(r3, r2, &(0x7f00000002c0)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0xff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0xb4a) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000080)={0x5}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f63", 0xb1}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:50 executing program 5: keyctl$get_security(0x11, 0x0, &(0x7f0000000240)=""/81, 0x51) r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1292.646446][ T1027] loop5: p1 p2 p3 p4 [ 1292.652337][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1292.658344][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1292.680617][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:49:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:50 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@orlov='orlov'}, {@nobh='nobh'}], [{@euid_gt={'euid>'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x33, 0x31, 0x31, 0x31, 0x34, 0x34, 0x30], 0x2d, [0x37, 0x34, 0x32, 0x33], 0x2d, [0x32, 0x32, 0x37, 0x64], 0x2d, [0x39, 0x38, 0x32, 0x59241892b7f1f36d], 0x2d, [0x61, 0x39, 0x50, 0x65, 0x36, 0x65, 0x31, 0x36]}}}, {@uid_gt={'uid>'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) [ 1292.699463][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1292.813590][ T1027] loop5: p1 p2 p3 p4 [ 1292.817832][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1292.823834][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1292.832479][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1292.840609][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:53 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040)={0x0, 0xfffffffe}, &(0x7f0000ee4000/0x4000)=nil, &(0x7f0000502000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x1}, 0x7fffffff) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x58e5, &(0x7f0000000240)={0x0, 0xfbdc, 0x10, 0x0, 0xa3}, &(0x7f00004e6000/0x2000)=nil, &(0x7f000003c000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000001c0)=0x0) r7 = syz_io_uring_setup(0x59d8, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') syz_io_uring_submit(r8, r9, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10, r11}}, 0x0) r12 = fspick(r5, &(0x7f0000000340)='./file0\x00', 0x1) preadv(r12, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/72, 0x48}, {&(0x7f0000000400)=""/229, 0xe5}, {&(0x7f0000000500)=""/43, 0x2b}, {&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/244, 0xf4}], 0x5, 0x800, 0xffff) syz_io_uring_submit(r1, r6, &(0x7f0000000300)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[r5], 0x1, 0x0, 0x1, {0x0, r10}}, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:53 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:53 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(r0, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) accept(r0, &(0x7f0000000200)=@nfc_llcp, &(0x7f0000000000)=0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:53 executing program 4: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r5 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000400)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000380)=@ethernet={0x306, @multicast}, 0x0, 0x0, 0x1, {0x0, r6}}, 0xa620) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r8 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x7) syz_io_uring_setup(0x9, &(0x7f0000000240)={0x0, 0x1ab8, 0x4, 0x0, 0x82, 0x0, r8}, &(0x7f00004df000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) utimensat(r8, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x100) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:49:53 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r4, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:53 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x4) 07:49:54 executing program 5: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_setup(0x2ba3, &(0x7f0000000240)={0x0, 0xb76, 0x4, 0x0, 0x3c3, 0x0, r0}, &(0x7f00003c2000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) mknodat(r4, &(0x7f0000000580)='./file0\x00', 0x1, 0x80000000) connect$unix(r4, &(0x7f0000000500)=@abs={0x1, 0x0, 0x4e23}, 0x6e) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x6e, r5, &(0x7f0000000300)="fb11203c", 0x4, 0x9e5, 0x0, 0x1, r6}, &(0x7f00000003c0)) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000100)=0x80000001) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x28c8, &(0x7f0000000400)={0x0, 0x543b, 0x4, 0x1, 0x22}, &(0x7f00000e7000/0x3000)=nil, &(0x7f000026c000/0x4000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) [ 1295.902704][ T1027] loop5: p1 p2 p3 p4 [ 1295.906779][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1295.912852][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:49:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) [ 1295.947647][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1295.958393][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1296.143697][ T1027] loop5: p1 p2 p3 p4 [ 1296.147717][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1296.153729][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1296.161240][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1296.168988][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(r0, 0x0, 0x4) 07:49:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x80080, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/201, 0xc9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:56 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r3, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:56 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000000)) r2 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x80) openat(r2, &(0x7f0000000080)='./file0\x00', 0x460000, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 07:49:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_MSG_GETRULE(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x12e4, 0x7, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_USERDATA={0xee, 0x7, 0x1, 0x0, "2fd86453144756404005217ca022a9a2d06a3c77ca0f24bb9edaad67a8704903cfed7712e024097f82b75097e552e9d6ea031b1983661c73fdee4d5b0dc35d9968b2ed29c96e1aaff296bd44f3bb4feeb9f0ce14991a9b8b333577f7556fa6fe41746b4039a6719e8e2b016c0c7c0c2e2e95e842e2368264cc5d08053be3e5ad9dde31ca38035d67a3643bda34993ab88893c90fb41686aee87437a40eedfe65653fb3a2a96b602eba3912caf58a2b0dafb58065047b019dc33c1542b48b7cd96adb07f18005f06727459cb0da494af252938e46ec08d7823be32fe899991f7dce761bdf3dc0314005cb"}, @NFTA_RULE_USERDATA={0x1004, 0x7, 0x1, 0x0, "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"}, @NFTA_RULE_COMPAT={0x4}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_EXPRESSIONS={0x64, 0x4, 0x0, 0x1, [{0x60, 0x1, 0x0, 0x1, [@xfrm={{0x9, 0x1, 'xfrm\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @void}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @void}, @numgen={{0xb, 0x1, 'numgen\x00'}, @val={0x4}}, @socket={{0xb, 0x1, 'socket\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @void}, @lookup={{0xb, 0x1, 'lookup\x00'}, @void}]}]}, @NFTA_RULE_EXPRESSIONS={0x15c, 0x4, 0x0, 0x1, [{0x64, 0x1, 0x0, 0x1, [@flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @void}, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x28, 0x2, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xc6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffff}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}, @objref={{0xb, 0x1, 'objref\x00'}, @void}]}, {0xf4, 0x1, 0x0, 0x1, [@byteorder={{0xe, 0x1, 'byteorder\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x1}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x82}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x7}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x5}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_SYNPROXY_FLAGS={0x8}]}}, @dup_ipv4={{0x8, 0x1, 'dup\x00'}, @void}, @limit={{0xa, 0x1, 'limit\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}, @target={{0xb, 0x1, 'target\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @ct={{0x7, 0x1, 'ct\x00'}, @void}, @hash={{0x9, 0x1, 'hash\x00'}, @void}]}]}]}, 0x12e4}, 0x1, 0x0, 0x0, 0x24040000}, 0x800) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(r0, 0x0, 0x0) 07:49:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) r0 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0) faccessat(r0, 0x0, 0x0) 07:49:56 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x80080, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/201, 0xc9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:49:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7ff}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004044}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, 0x0) 07:49:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be", 0x72}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1298.706043][ T1027] loop5: p1 p2 p3 p4 [ 1298.710087][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1298.716071][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1298.729250][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1298.741066][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:49:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63", 0xbe}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:49:59 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) mmap(&(0x7f00000b2000/0x2000)=nil, 0x2000, 0x2000001, 0x2010, r2, 0xf8065000) r3 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r3, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x4000010, r1, 0xfc363000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = timerfd_create(0xd, 0x800) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000200)=""/85, 0x55}], 0x1, 0x2, 0x40) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/30, 0x1e}], 0x1, 0xd9f, 0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:49:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:49:59 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x2f2040, 0x13) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:49:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be", 0x72}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1301.728700][ T1027] loop5: p1 p2 p3 p4 [ 1301.735842][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1301.741976][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1301.758138][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:49:59 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1301.775928][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f49", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:02 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) bind(r0, &(0x7f0000000400)=@vsock={0x28, 0x0, 0x1ffffd8ee, @host}, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x20c12c1982bbc3aa, 0x12, r0, 0xd4c94000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/127, 0x7f}, {&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000380)=""/107, 0x6b}], 0x3, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x10001, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x5, &(0x7f0000002000)={0x2, 0x0, 0x80000}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x8000}) fcntl$lock(r1, 0x6, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x203}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:50:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:02 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be", 0x72}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) [ 1304.758910][ T1027] loop5: p1 p2 p3 p4 [ 1304.763097][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1304.769067][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1304.793641][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:50:02 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) [ 1304.807310][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f49", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:05 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) 07:50:05 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) tkill(r2, 0x1b) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:05 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:05 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0506617, 0x0) 07:50:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}, {&(0x7f0000000200)="35b9532c159fde345fa90839f90a88bbf029cebc40ed2124b006916c0d3585f4a657cfe6d85896becf590b6e27f1e9560a3d18eef7f0d105aee96b9c8dce5c80e0779eb5596e738aaafeefe3a6bee80ce7dfcd3f3b45fd1f3087fe8c162fa657e4401f5e73f8983165417b615c94bb", 0x6f}], 0x5, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:05 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:05 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) [ 1307.781961][ T1027] loop5: p1 p2 p3 p4 [ 1307.790049][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1307.796231][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1307.825928][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1307.838925][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f49", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:08 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:08 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:08 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:08 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:08 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r3, &(0x7f0000000200)='net/ip_tables_matches\x00') tkill(r2, 0x34) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000000)) ptrace$cont(0x423e, r4, 0x0, 0x540000) ptrace$setopts(0x4206, r4, 0x1, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clone3(&(0x7f00000004c0)={0x88000, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x4}, &(0x7f0000000300)=""/228, 0xe4, &(0x7f0000000400)=""/96, &(0x7f0000000480)=[r2, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3], 0x6}, 0x58) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:09 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:09 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) [ 1310.807013][ T1027] loop5: p1 p2 p3 p4 [ 1310.811212][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1310.817209][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1310.836361][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1310.846010][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:11 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:11 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:11 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:11 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) ptrace$cont(0x9, r2, 0x0, 0x0) r4 = getpid() ptrace(0x10, r4) rt_sigqueueinfo(r4, 0x7, &(0x7f0000000200)={0xf, 0x3, 0x70}) 07:50:12 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:12 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1313.831772][ T1027] loop5: p1 p2 p3 p4 [ 1313.836202][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1313.842207][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1313.859923][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1313.890994][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1313.927355][ T1027] loop5: p1 p2 p3 p4 [ 1313.931797][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1313.937859][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1313.945378][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1313.953069][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:14 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:15 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:15 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) 07:50:15 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x5cebb000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001480)='/dev/bsg\x00', 0x400, 0x0) vmsplice(r3, &(0x7f0000001500)=[{&(0x7f00000014c0)}], 0x1, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000013c0)=[{&(0x7f0000000080), 0xa}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/189, 0xbd}, {&(0x7f0000001580)=""/221, 0xdd}], 0x10000000000000e6, 0x60, 0xc68a) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001680)="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", 0x11e}], 0x4, 0x6) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000001540)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) r4 = open(&(0x7f0000001400)='./file0\x00', 0x10000, 0xc2) write$selinux_attr(r4, &(0x7f0000001440)='system_u:object_r:clock_device_t:s0\x00', 0x24) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:15 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1316.926310][ T1027] loop5: p1 p2 p3 p4 [ 1316.934372][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1316.940395][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1316.950235][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1316.959053][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1316.982040][ T1027] loop5: p1 p2 p3 p4 [ 1316.986133][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1316.992251][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1316.999762][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1317.007274][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:17 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) 07:50:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:17 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:17 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) 07:50:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:18 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x6, 0x0) 07:50:18 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:18 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a7038", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:20 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:20 executing program 1: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:21 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:21 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1322.814653][ T1027] loop5: p1 p2 p3 p4 [ 1322.819049][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1322.825059][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1322.838567][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:50:21 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:21 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:21 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r4 = getpid() ptrace(0x10, r4) tkill(r4, 0x2f) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1322.864368][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a7038", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:23 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:23 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/99, 0x63}, {&(0x7f0000000280)=""/173, 0xad}, {&(0x7f0000000340)=""/83, 0x53}, {&(0x7f00000003c0)=""/231, 0xe7}, {&(0x7f00000004c0)=""/250, 0xfa}], 0x5, 0x3dc, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0xc0000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:23 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write(r0, &(0x7f0000000000)="9fc624c3ad8b0fa5cf835a992676d4aea66b671f6839768e9ca9168630852aa4f7e2f29ea1d4566c5e23758841", 0x2d) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:24 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:24 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1325.848647][ T1027] loop5: p1 p2 p3 p4 [ 1325.855760][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1325.861908][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1325.876961][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:50:24 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) [ 1325.892752][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:24 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:24 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a7038", 0xc9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:27 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:27 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x6c9f9000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r3, 0x0, 0x540000) wait4(r3, &(0x7f0000000080), 0x4, &(0x7f0000000200)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r4 = fcntl$getown(r0, 0x9) sched_getattr(r4, &(0x7f0000000000)={0x38}, 0x38, 0x0) 07:50:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:27 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:27 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) [ 1328.928364][ T1027] loop5: p1 p2 p3 p4 [ 1328.940930][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1328.946956][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:50:27 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1328.974877][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1328.992277][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000200)=""/193, 0xc1}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000300)=""/207, 0xcf}, {&(0x7f0000000400)=""/214, 0xd6}, {&(0x7f0000000000)=""/37, 0x25}], 0x5, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) gettid() mmap(&(0x7f0000187000/0x3000)=nil, 0x3000, 0x3000000, 0x10, 0xffffffffffffffff, 0x84559000) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:30 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1331.940613][ T1027] loop5: p1 p2 p3 p4 [ 1331.947330][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1331.953365][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:50:30 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:30 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1331.997710][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1332.007372][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:33 executing program 0: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:33 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) [ 1334.963721][ T1027] loop5: p1 p2 p3 p4 [ 1334.968081][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1334.974073][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:50:33 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) 07:50:33 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc080661a, 0x0) [ 1335.008406][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1335.028123][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1335.104462][ T1027] loop5: p1 p2 p3 p4 [ 1335.108683][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1335.114786][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1335.122227][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1335.129792][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1335.158817][ T1027] loop5: p1 p2 p3 p4 [ 1335.163025][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1335.169001][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1335.176983][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1335.184486][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:36 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = getpid() ptrace(0x10, r3) ptrace$cont(0xb511f511907cd1c1, r3, 0x0, 0x3) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$setregs(0xd, r2, 0x29, &(0x7f0000000000)="e72c0826207d64d2c16f168bed09cc6fb2d937c27c8c0835fbf61ba8d089d0883e7d1477edf7f9eada04") ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:36 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:36 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:36 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) [ 1338.030329][ T1027] loop5: p1 p2 p3 p4 [ 1338.034701][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1338.040725][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1338.060868][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1338.069169][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1338.110377][ T1027] loop5: p1 p2 p3 p4 [ 1338.114384][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1338.120361][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1338.127717][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1338.135428][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000167000/0x3000)=nil, 0x3000, 0x2000000, 0xd8012, r1, 0x80000001000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x18) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:50:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:39 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) [ 1341.101029][ T1027] loop5: p1 p2 p3 p4 [ 1341.106979][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1341.112993][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1341.129252][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1341.137438][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80102, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDENABIO(r3, 0x4b36) wait4(r2, 0x0, 0x20000000, &(0x7f0000000200)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x6, 0x5) gettid() tkill(r2, 0xf) 07:50:42 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) [ 1344.131513][ T1027] loop5: p1 p2 p3 p4 [ 1344.135872][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1344.141902][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1344.150521][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1344.158108][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:45 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000000)={0x1e, 0x37, 0x1, {0x2, 0x100000000, 0xfff, r2}}, 0x1e) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:45 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:45 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x35) ptrace$cont(0x18, r2, 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/130, 0x82}], 0x2, 0x8000, 0x1) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:45 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1347.164632][ T1027] loop5: p1 p2 p3 p4 [ 1347.170820][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1347.176882][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1347.192952][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1347.209099][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1347.231469][ T1027] loop5: p1 p2 p3 p4 [ 1347.235479][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1347.241515][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1347.250143][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1347.257640][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1347.274871][ T1027] loop5: p1 p2 p3 p4 [ 1347.279239][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1347.285193][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1347.293085][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1347.300700][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:48 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x7, 0x7) 07:50:48 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0xc0406619, 0x0) 07:50:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r3, 0x80000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() accept4(r0, &(0x7f0000000200)=@alg, &(0x7f0000000080)=0x80, 0x4f8700e44b01e3be) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x34) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) 07:50:48 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x7, 0x7) 07:50:48 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) [ 1350.122064][ T1027] loop5: p1 p2 p3 p4 [ 1350.136111][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1350.142242][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1350.155942][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1350.164300][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1350.215372][ T1027] loop5: p1 p2 p3 p4 [ 1350.221575][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1350.227569][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1350.235425][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1350.243395][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x7, 0x7) 07:50:51 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc080661a, 0x0) 07:50:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/237, 0xed}], 0x3, 0x5, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:50:51 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:51 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) [ 1353.123635][ T1027] loop5: p1 p2 p3 p4 [ 1353.133704][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1353.139721][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1353.151814][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1353.163178][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1353.206673][ T1027] loop5: p1 p2 p3 p4 [ 1353.218790][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1353.224864][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1353.242767][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1353.252681][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1353.283781][ T1027] loop5: p1 p2 p3 p4 [ 1353.287873][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1353.293864][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1353.301399][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1353.308993][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) 07:50:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc080661a, 0x0) 07:50:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4001, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406618, 0x0) 07:50:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:54 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406618, 0x0) 07:50:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406618, 0x0) 07:50:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:50:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x502, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0286687, 0x0) 07:50:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1359.157499][ T1027] loop5: p1 p2 p3 p4 [ 1359.161613][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1359.167587][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1359.185715][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:50:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0286687, 0x0) [ 1359.205338][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:50:57 executing program 4: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) splice(r0, &(0x7f0000000100)=0x2, r3, &(0x7f00000001c0)=0x80000000, 0x8, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x13, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:50:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:50:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r1, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:50:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:50:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000380)={0x1, 0x0, 0x1000, 0xd2, &(0x7f0000000200)="d680e2b1976e6d404a8c9077be0c1e79e03cbb7bd1fc74c5f6ce2101a77edafeb42d2ff8bb012db968111d2d4acce91e3673d41d94980dfe0607fd2808941ea614ebd6825de4000c8b2378857ab18f02e36dfe7af14ad73c3e32c2e1b6c80c4d1838ca6d4ffb878d5a63153be419e2b7a209149d6ece328137a5f0a734730176e6b5033010b8d635fad1d577222b17ee27cb7949c32babd1a5909b11e7c279ede34787ed4b40e9263ed7fbd8855640c6af3fb699cf5561d802ef99bd74e7c1d20686d889a472eb82af06d34dbb2d01119960", 0x50, 0x0, &(0x7f0000000300)="224d5599d3ec0dda515dc331ca943706821a322141c286e38aa4d9195123e7dfc053cfdd204f5acbe2914ede3b989a70d2e8db8f276f5a121bbb4c0e739e479dfc8e70324e080f42347d6688f6dbff75"}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:51:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) [ 1362.188721][ T1027] loop5: p1 p2 p3 p4 [ 1362.192828][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1362.198821][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1362.206265][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1362.213899][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:51:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0406619, 0x0) 07:51:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) clone(0x4020200, &(0x7f0000000200)="aff1cf7bfa3839b3c2497cb66cc4712753bca2d367a61ef5ffbc8ec46be53d62338fe3356a5eb8e0c833558a381a431548c2c49ed101b0070185e53636981632d8252572728168606d7ac18c2de3227e1ce19f15eabed7ed1d3a53ed6a9172639fbdaa0d264d2ba03b597909374279cdac56fa1cded708fe3d", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000280)="96d8911889923eeca30056bd563eda4208ba22566b729a0f") ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000007, 0x12, r3, 0x3be1d000) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000300)="58e3c28853b139a3e11d0ba974059ed9f3e705fb6571b1db486763c74cdd2b402b0f45b731b7a1ff6ff8a9703d358f2d3ebda6a1ab38c9af9b7899dc42b949431e1bd416a9a68b64a9f245f61dabd530326c1f293b0d5a002d0a71db43a10f0db34535500c230a8e800a2ba88293c119d6083aff54edf76dfc1c2c788683b9814e171f", 0x83, 0x51, &(0x7f0000000400)={r4, r5+10000000}) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:03 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) 07:51:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:03 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) [ 1365.200561][ T1027] loop5: p1 p2 p3 p4 [ 1365.204718][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1365.210723][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1365.218291][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1365.225851][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:03 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0xc0406619, 0x0) 07:51:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)="2adeee8ace3b313379710b7f2390a02d11add462f0112f2fc479cb8368c9be50abdb785c1d285fe0b4e09d991e214cf103e100390b6a20b07fea666bd4defab08acfafe9a6d0fbe58785d1a4f172be937ba653fbfa5f3dcaab7c24ac9d8e", 0x5e}, {}, {&(0x7f0000000100)="a81d56c856f7d9d525f321407869aa3189c211cbbdb5cafa911a164e8d3c9d46b722c6020e5583d4a9f674995ae7556a54fd4ed5c4824673453d09673ac7e4e2559f0ea97499b5542ec93b0b8a94e406b7220fde25292a1c81", 0x59}, {&(0x7f0000000180)="fa6c1e72e1d5d6265931ef1939935f259850fe494998a11624ccac749464ea568dcfc67418d7c135bd788a90b76c3a77ce5e744859ca5c7f91a974c6775612fc58fd62c725334c2957381530dc5ff9f894dcc82f3bc01c3957d47a0b05cd95b6de6fd844f11be0c3d7899f1b17db59ae0dc2dcc5e9de34df5d1b5d054fd8a7b8f1de32e8aab9fad3fb15207ef7c33fa80d2b22249d7f7e069a7367dde49baf8dbb279b391c99b39d3cc8afb44f0626d11e0a9f4077577db379b97de980b3d204362ca513ea54ab86b65294155b1472f910158f4e7f5a03e40db7c9887382ea5c9e564dc61c2f45b6398bcf249f86", 0xee}, {&(0x7f0000000280)="f2f99c84550e0653e4d6eae45c08f8b22c401ccf67bd8777026ce466c52b1ac21116c5fd467fc86b504e9aef6ac5cb45c18c0ca449c5ac8800104d84a2172f8cdddbe97ea757cc6166fb1d51d04343b2cdb2613fc6c679ac0a30f87ff8a4291b52d846146ccf1d00596ee9e3d8892fba68a6fe2d9a9e090a21442f28ef3bf090fd4b3b927ac7cbf1b42163e73e447d90a281ba5ee24ce1643e7d539abd2c3cbb64adf6901614f438859d3876", 0xac}], 0x5, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = getpid() ptrace$setregs(0xf, r3, 0x101, &(0x7f00000003c0)="7816084c177d0d56d2ad9667bc69d637319316529c0bcda5d5e53766b17d0a042b711cbe69f455c5fdc9bffe351f7b3f8b69df5bbbfb32156502f251482659f9f0325d386db2b3421a15924ca2b9da1d65fe2cbafbde059d80625c5dcadee1327a3d41fdfdff7c13b8565f57cde8c3498d1dee25f89163031fb39a2ce009f31f8a2ecf73568b8e0a52f771c031888c51cb6516ba29e68ddbced797d46a834fa5eca3d727b2057ee79f963ac4ba1bea92294eef72a87c43fe227fb8b2f097cfb1c3d6b696d9941345c8") ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) [ 1368.214259][ T1027] loop5: p1 p2 p3 p4 [ 1368.218543][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1368.224652][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1368.232842][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1368.240603][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0xcc6b, 0x1, 0x3ca}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, 0x0, 0x0, 0x0) 07:51:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, 0x0, 0x0, 0x0) 07:51:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00', r1) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) write$binfmt_misc(r3, &(0x7f0000000200)={'syz0', "29dd406b2d4eb57a987042b6464f2bf1b17c080acdf1b1f859033aa73013d47aa72b0ea001b52463f2d6bc6494895c509b9db6954df11ca274b28596b3171f106a78dd0041929bb62c33fed228ebe49bb59d81d9fed1bc3f57aabfd18c9e2c6de2d9f736b9e2118773d9846024b5d3c3f9368d961e7b163aafb00ad4ad0870471e8a68e9cdd2575911727623cee6aed728eca85645e777997a7bbfa276006148104ea95816fef312dcf4a7b644f10d44869793a5b03b019f86ee868dfa18b3a3d240d71dee0fbb8d773098a9b0ad00c2019bb3"}, 0xd7) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, 0x0, 0x0, 0x0) [ 1371.229535][ T1027] loop5: p1 p2 p3 p4 [ 1371.233655][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1371.239655][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1371.250128][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1371.258443][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:09 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0096616, 0x0) 07:51:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 07:51:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:09 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0xc0096616, 0x0) 07:51:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 07:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) r3 = socket$netlink(0x10, 0x3, 0x8) connect$netlink(r3, &(0x7f0000000000)=@unspec, 0xc) ptrace$cont(0x18, r2, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r4, 0x80585414, &(0x7f0000000200)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$KDSKBLED(r0, 0x4b65, 0x400) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 07:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000682000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 07:51:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) ptrace$cont(0x20, r3, 0xfff, 0x1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1374.239004][ T1027] loop5: p1 p2 p3 p4 [ 1374.243039][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1374.249196][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1374.258160][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1374.265893][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 07:51:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 07:51:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x1, 0x0) 07:51:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x1, 0x0) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x1, 0x0) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) [ 1377.254602][ T1027] loop5: p1 p2 p3 p4 [ 1377.258752][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1377.264720][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1377.273764][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1377.282323][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42041, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000000280)=""/150, 0x96}], 0x2, 0xffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @private=0xa010102}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='batadv0\x00', 0xdfe, 0x5, 0xe139}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = getpid() ptrace(0x10, r4) sched_getscheduler(r4) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:51:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:15 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200101, 0x0) r1 = openat(r0, &(0x7f0000000040)='/proc/self/exe\x00', 0x442202, 0xac) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x3, 0x7ff) ptrace$cont(0x9, r3, 0x0, 0x0) 07:51:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r3, 0x8001, 0x1) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r2, &(0x7f0000001b00)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000000000)=@ieee802154={0x24, @short}, 0x80, 0x0}}], 0x2, 0x0) 07:51:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1380.268084][ T1027] loop5: p1 p2 p3 p4 [ 1380.272246][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1380.278281][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1380.287922][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1380.296126][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) tkill(0x0, 0x3) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r3, 0x0, 0x540000) tkill(r3, 0x12) ptrace$cont(0x9, r2, 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000200)="a7b92e66ff1b274a5f1071e5fae12f148abdf7f86f08bf7c50fe7942c2c43ee5a68b3332f227a6743cb44e8ad18dc09a4505887c0704d3683b79c31c95f06935f179e1b1fb569f84f2b48c92a3d5a220ecd91d7bc57d90a3275bd059cfcb676e59d4aba9c917daca444e0be48600447ffa4e68db7f1c76e258e956e51aa6721ae4cafd115dfc5a29f7488c5f3515e9b754de1a317da8f22ba098f5de835ecfbcf1f9cd2d4b7085680c107d6c01a11a1a13c19f4d41633d9d9b35", 0xba, 0x9}, {&(0x7f00000002c0)="d726edda372ec3b64b666d66c7205e0fd0f3782b2e552e6eca631c6e2f344c90b7f8d106c1b49a92483d9330a2b0da3042b51c51fe419e44c2df48adb5342f14a34c3d4d0ede4d2959058eb96908586a0dbf4580829aac59739541c2c991a8d36e2f898cf3b58fcaab0e31e3b37dbbbe19854ea5404769970c0d086a46b206c6f292e6fd4925e09ad82797c05f405c6694e0a4ec638e6058aadc140c07c8c591d8d6030834ef7d9490a169a7c67c20b9808d5eec689fa60c9bbf7ee0d55ee7c8530a25dbc000490c860f555ca43760ccaa9ac272d7ecf9ccc2f6261fd4de5b3cc0738d80b63b57d682e8", 0xea, 0x6}, {&(0x7f00000003c0)="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", 0x1000, 0x7}], 0x41400, &(0x7f0000001440)={[{@dioread_lock='dioread_lock'}, {@nodelalloc='nodelalloc'}, {@errors_remount='errors=remount-ro'}, {@max_batch_time={'max_batch_time', 0x3d, 0x81}}, {@nojournal_checksum='nojournal_checksum'}, {@nomblk_io_submit='nomblk_io_submit'}], [{@euid_lt={'euid<'}}, {@euid_eq={'euid'}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '\\'}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) openat(r4, &(0x7f0000001540)='./file0\x00', 0xc00, 0x1) 07:51:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:21 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) [ 1383.288270][ T1027] loop5: p1 p2 p3 p4 [ 1383.292484][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1383.298595][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1383.315994][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1383.324694][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000719000/0x4000)=nil, 0x4000, 0x1800003, 0x100010, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1383.350647][ T1027] loop5: p1 p2 p3 p4 [ 1383.354687][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1383.360670][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1383.368571][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1383.375990][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:21 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:24 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) r3 = socket(0x11, 0x3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @private}}}}}, 0x0) r4 = syz_io_uring_setup(0x59d8, &(0x7f0000000240), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') syz_io_uring_submit(r5, r6, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7, r8}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0xffffffff) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1386.345405][ T1027] loop5: p1 p2 p3 p4 [ 1386.349762][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1386.355737][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1386.363464][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1386.371158][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{&(0x7f0000000200)=""/239, 0xef}, {&(0x7f0000000300)=""/153, 0x99}, {&(0x7f0000002540)=""/97, 0x61}, {&(0x7f0000000440)=""/120, 0x78}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x6, 0x4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:51:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r3, 0x0, 0x540000) move_pages(r3, 0x2, &(0x7f0000000000)=[&(0x7f000034f000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000080)=[0x400, 0x401, 0x6, 0x1ff, 0x1, 0x8000, 0x1000, 0x8], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ptrace$cont(0x9, r2, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) 07:51:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:51:27 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:27 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:51:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1389.362848][ T1027] loop5: p1 p2 p3 p4 [ 1389.367114][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1389.373083][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1389.381792][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1389.389558][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:27 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:27 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x20) preadv(r1, &(0x7f0000000940), 0x0, 0xd9f, 0x0) r2 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10, 0x80000) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000200)=""/210, 0xd2}, {&(0x7f0000000300)=""/144, 0x90}, {&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/83, 0x53}, {&(0x7f0000000600)=""/104, 0x68}, {&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/64, 0x40}, {&(0x7f0000000700)=""/236, 0xec}], 0xa, 0x1000, 0x4008e72f) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) r4 = creat(&(0x7f00000008c0)='./file0\x00', 0x0) accept4$inet(r4, 0x0, &(0x7f0000000900), 0x80000) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:51:27 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x7, r2, 0x9, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:27 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f00007ae000/0x14000)=nil, 0x14000, 0x2000001, 0x11, r3, 0x36746000) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:30 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1392.373270][ T1027] loop5: p1 p2 p3 p4 [ 1392.377457][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1392.383430][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1392.391563][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1392.399292][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x101080, 0x22) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) mmap(&(0x7f0000541000/0x1000)=nil, 0x1000, 0x8, 0x13, r1, 0x9fb64000) tkill(r2, 0x34) clone(0x26061480, &(0x7f0000000000)="43e60e573b353f9b972a7e2d4d29cde1c1b615b27d64e083c7ce4b1481e186880ec3f8e9e99dd54a1b27ee264d0cb6d477", &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000240)="4c7563459b3a2b1ab6a9a3173632a8651852a458ee75dd6dcd1c8fb5cc02d414e0461cbd66d1eb2810c7754a44802fe50e0a65af47048b87aa31eda64f84ef9cfdc510b519d7d1034829c8f1d9df561b156827ebc910fcfcc9265fca7e8a76eacd1f1c0fd1d591c041ead0fd600f2f74aa882ee497bd8adae7d4a1edba52452e47e1d9421adf3714f5abf2d3ddb0c4d4331e2c14f2b3da8554aed448bbe1c51aad2dee6b413d2406fc2e8d7b9ac835be42285315365a29ced1ba4de603df4cc8a0af72624fc54858") fcntl$setownex(r1, 0xf, &(0x7f0000000380)={0x1, r2}) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x4201, 0x0, 0x0, 0x540000) sendmsg$unix(r3, &(0x7f0000000a40)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000440)="abaeaab6aa71c1d5b2a63129c2a73c9de8bf5fbbe7c5d7ed3e5202fb398ae7d1d5d6a2f3271ff9cbf4c4c49d48f92e23bafd3f8e4789d0f2b3f90fb2b226457a3505db124397ee42ad4c4c352560a3e0a96dc55c78e3e5b47d5cc7e76d0d19dd3d715d8e600ffd662cf6", 0x6a}, {&(0x7f00000004c0)="04edc56415957f593654dbd7b29ed4f6d931d3f530ede4364d251cb790e28a8e16d74c41", 0x24}, {&(0x7f0000000500)="a4e819e57b8313601188dda194732c2e5336619d4f626631cb4298c014b53d7c4796be37b1546e9c9cba9eba7f0bbd9b2d3fad3bcd4848070f4c979338c73ca4d5b665f0aa5143004ac6f9a46b6e2bdc95d73ef07acc55fe814d1a69665c2545f93b14329e2bc680e97a41cde95e3feb0ecbb8d863b76b316f4bc4e3427cb2f3e073629bb409c24791e99205aee5bc29e246905678b53dcf1a5699b9a76697e4ddf71c5adb23386e2676ddc6e044d72662e9768b45f92857938c685f5a6c19d1bd366bccf272217f545175969484f3190b4d2ba096437775155c785b1a627759bdee8a982e62b50922781a241f8ee3673aa61c58", 0xf4}, {&(0x7f0000000600)="3f83693c80993e89be8a9c09a8502775ef704f72cbeaf22179eb96733ffc81f2620d5d9eaaa221392a8c2bffc6fc03c897aa848574da87c1da6971d820516e30e3eaa5fbff4e04bc7b0257379af3e85d2731a862cc5a903ae0d7acdaaececbc734b36d2d1fa7ccdfa0871d7422f3cb14d1c8f64d4ec45b1bad4038", 0x7b}, {&(0x7f0000000680)='f}', 0x2}, {&(0x7f00000006c0)="d3ff7ecdb807705bfd21581e5054836749600530a8c5429bec0b799c01e4e848df24c3bd5e04b206be889695f06d2d1deb0bb6db995eaecc16193a4c024d00ab5bb07d2222b638ebc83e5979a363665df6130e0423c4427f0b1d72249be32790ef5e55f340dadfe23a6af3993fb000fc2d4e31bd559e79b6b97f5cf200fd03519cd5215e1c2bf00a99d051cbd62e65c9e371867551cc5679deb7f59d5d9a5013301c39b04e9a5dd04bf19bc469606f263adb1c00b0", 0xb5}, {&(0x7f0000000780)="922cbdc4fded9c984aea8970071b10bd4dafd3f04227bd1b79f1303be8f2c92774ef2bd672ec3e08f4a49e5684dfc8f0915532e12cd8bc910ec293d4fb33d7e8bbc4845afcdf1361b6620301d76343ff6fb6d270021920956f530b3c68e6471d96ca69a12660a01bfb812741d57d7ba78c975dbd9c4babe2ed4b92ef99f4dbf0f73855ec9471ba478651", 0x8a}, {&(0x7f0000000840)="929ac2feb54500cdecc84279440fbd0d3082f1c32cf5c5ab12ae2a403890c0f7", 0x20}, {&(0x7f0000000880)="1bc026356c2dcdb9969d43121d23216f38b31f30695a079ab6d4b4c9a23396961195a395612674e0177d1af9847f156795dec97a2369bacd283ddda0460f02c145d12a171cb2ecc6aac4a12cc95ae78871e135123a7ebce881553d935a6d88c522c08e72cd1f66b7bd69786dd742c12d1508d34e2fc690fa9c122fb9fa738fd2d0c517a0c6e33bb0d4df97c0d070763c2f8ed7244439365a3cb1e3ccff875ed7afb8c84cf1", 0xa5}], 0x9, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}], 0x20, 0x40}, 0x4000000) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$setopts(0x4200, r2, 0x2, 0x63) 07:51:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:33 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x0, &(0x7f0000000080)="56437bf0e6d049110bc7b3", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="07c1b3754c68f536e075de4abf6f8b777e01b4fd6acedf664addf761eab67aab3a5820af0aa74bcf929f") wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f00000002c0)=""/245, 0xf5}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000400)=""/170, 0xaa}, {&(0x7f00000004c0)=""/110, 0x6e}, {&(0x7f0000000540)=""/87, 0x57}, {&(0x7f00000005c0)=""/32, 0x20}, {&(0x7f0000000600)=""/144, 0x90}, {&(0x7f00000006c0)=""/110, 0x6e}, {&(0x7f0000000740)=""/231, 0xe7}, {&(0x7f0000000840)=""/236, 0xec}], 0xa, 0x5, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x6, 0x80) ptrace$setopts(0x4200, r2, 0x8069, 0x10) 07:51:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = getpgid(r2) tkill(r3, 0x29) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000000)) ptrace$cont(0x4201, r4, 0x0, 0x540000) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r2, 0xfffffffffffffffd, 0x10000) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1395.384793][ T1027] loop5: p1 p2 p3 p4 [ 1395.389172][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1395.395144][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1395.403573][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1395.411680][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) ptrace$getsig(0x4202, r3, 0x8, &(0x7f0000000280)) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fchmodat(r4, &(0x7f0000000000)='./file0\x00', 0x0) 07:51:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:36 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x440000, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0xfffffffffffffffc) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1398.397768][ T1027] loop5: p1 p2 p3 p4 [ 1398.401954][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1398.407962][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1398.415334][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1398.423243][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:36 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1401.413394][ T1027] loop5: p1 p2 p3 p4 [ 1401.417500][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1401.423462][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1401.433691][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1401.442430][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000200)="10e4f386d3bc1dbe54e4571bb6d1b460e44748ab4a35efa3ae02a146f23ba320b2e25fb6c24f3267277b913f5283b5307a0000008069e438ced730eea245e30faadfec8c4c0126036d21d69cec25259438694fbbf17bb37cf0238b5f36ac6b7df6cef39bca12ffb20a51f290f223bfe422a3792b6838adb3c5f672a8d452fea62808cf0723709176dca32b87c919dfb97dc5d5cfc874f07e4de687474d1893366ca1deafaf5d16b6fc8e9b642900") ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1401.465070][ T1027] loop5: p1 p2 p3 p4 [ 1401.469336][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1401.475294][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1401.483221][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1401.490948][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:42 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x4504c000, &(0x7f0000000000)="b11a9771641655d7", &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000240)="ee6db4ba084ec974d906194514bc3429aa4026507b0b7d969b2ce9fb1f8b5fe9513a08738084db7316bb875c1de8617524bbca822c88") wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1404.558649][ T1027] loop5: p1 p2 p3 p4 [ 1404.563102][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1404.569114][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1404.585147][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:51:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1404.603190][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setregs(0xf, r2, 0x5, &(0x7f0000000200)="468cd8062215c685188894848589403d70c65f787392df298a39e6e337c0ebb444372c2c73bbb96c904a658d1aed0ed6bd6a20ebdf8e8f97bb01894b2d73ea229bb6825464a39ac64ffc8bae9062a7aba6e60eb12a409026003e4c7338bf3480064e23a017c88bdc7bb0e272a43eaec70ab340ef4620154ec4f537c8") creat(&(0x7f0000000000)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1407.579874][ T1027] loop5: p1 p2 p3 p4 [ 1407.584027][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1407.590025][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1407.606521][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1407.614334][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:45 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:48 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:48 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:48 executing program 2: sendto(0xffffffffffffffff, &(0x7f0000000200)="48c7cca16b01996a18ef6e2989960ffc7235310d2456b223b30d6386f872d4f4be607248b1e2fcd0b37f5b6eebc0a42f091cf2a613c2451036a9d99a171529062284e3f008dfb2003a9ba9ce9a3044cefdbb2e3aeb4e61c581e37c", 0x5b, 0x850, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x2, @empty, 'syzkaller0\x00'}}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x30d601, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) process_vm_writev(r2, &(0x7f0000000300)=[{&(0x7f0000000080)=""/30, 0x1e}], 0x1, &(0x7f0000001800)=[{&(0x7f0000000340)=""/149, 0x95}, {&(0x7f0000000400)=""/16, 0x10}, {&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/20, 0x14}, {&(0x7f0000001580)=""/237, 0xed}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000001700)=""/220, 0xdc}], 0x8, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) writev(r0, &(0x7f00000029c0)=[{&(0x7f0000001880)="bb22c5e03d3b4d4e4e1f2eda425712d57eedf1d2884e70408d74d5a4c6c4800cf6f9b16b6472eb8641ffb6607186922a8189b8e3ece94b5c8d314b7c73cc9b95875435468b4bb8466e5b96b03ea368679029b27318c48c2b82a3dc9c96a196d8e2ea8e3c1fbc3139dafbf668a43370175b7849bc6226ed68102f06da1012f8669d38bcb5fff7702b4250ebd87c6f60bd60ff8535d8fb1b075ac6e69fec598f292234f75a", 0xa4}, {&(0x7f0000001940)="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", 0x1000}, {&(0x7f0000002940)="b6cb06f3ed23482a7ec62bd8a3d7bf0191b61e72282726b0e6e0b35c51af758d4f49caf0b75d0e5b54468b1a2c598fb82b0bd1ee22e19ea2a37352d584a8f0c5a14b7296c2f134893ef53429ee6091e23d", 0x51}], 0x3) ptrace$cont(0x4201, r3, 0x0, 0x540000) r4 = getpgrp(r3) tkill(r4, 0x2f) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:48 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x400c6615, 0x0) 07:51:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:48 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1410.613622][ T1027] loop5: p1 p2 p3 p4 [ 1410.630461][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1410.636485][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1410.646152][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1410.668523][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:51 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:51:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x12082, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000200)={0x1fc, 0x19, 0x400, 0x70bd29, 0x25dfdbfd, {0x1}, [@typed={0xc, 0x7e, 0x0, 0x0, @u64=0x800}, @typed={0x8, 0x8e, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="2148e4218d5d53231c7a8148d22d40ce724101e47a83461b0ca4d69f10a14ef058ba7c1cf904f0f2d0a15a577bd945ad993a590669bd919aad198795d94c95cbac6902837dd478216788f1f3fac75bb70db19dc56b9f930e8ef7485553bfc68009bb65d4bae6823d36e23eae34f6d2b382288c7c01d9a2986c28daceaa053173f1e14a491d23d1668172b15fc6a373ec9fe44885df06fbbc727b394be5e2331750f1252c51ce474248c462ee96157c6db50c4f3cd1ba67eaeb3570700450c8f230ab24d32f23640e6b5fb9eac1c2c377f256", @generic="145bb4d79d4d62a259bbc1ba5c51fd80224a42f8c7443034ff8dbdc16439ae5198d35c8c91a2e87b78aa7c913cc3f1cce6ce2136f48d2cc73404e4058cffb24d6a67fa0b15bc08a21ed622a3c5884f6b5140c8003984e84d680737921623bfde59cf8c484579ebed055147ad0620791df77520dfae5c5c22030c4ee5a9b8b106c7354c40bee94b7cffab4883795a1918cf772022dfae135c46adeac833392b0093895afc3774f5cca61efada33", @typed={0x8, 0x5c, 0x0, 0x0, @u32=0x7}, @typed={0x8, 0x6a, 0x0, 0x0, @fd=r1}, @generic="fc", @nested={0x41, 0x5e, 0x0, 0x1, [@generic="901aeeec7da72375b356e6a14ac0381989a1c0224403a1c28d3fc2466be87652685e2eea7c540d9f216ee6a25a505ea8f96272bc5bbfc4eb13e068186e"]}, @generic]}, 0x1fc}, 0x1, 0x0, 0x0, 0x20000044}, 0x40810) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x34) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 07:51:51 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:51 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:51:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:51 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1413.631786][ T1027] loop5: p1 p2 p3 p4 [ 1413.636123][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1413.642224][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1413.663622][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1413.673448][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1416.646843][ T1027] loop5: p1 p2 p3 p4 07:51:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1416.668927][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1416.674967][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1416.705096][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:51:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) [ 1416.735603][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:51:57 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:57 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f000043e000/0x3000)=nil, 0x3000, 0x3000004, 0x110, r1, 0x43f17000) r2 = getpid() ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)={0x0, 0x0, 0x101}) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f00000013c0)={0x0, 0x0, 0x8001}) 07:51:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:51:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:51:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f000043e000/0x3000)=nil, 0x3000, 0x3000004, 0x110, r1, 0x43f17000) r2 = getpid() ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)={0x0, 0x0, 0x101}) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f00000013c0)={0x0, 0x0, 0x8001}) 07:51:57 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:51:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f000043e000/0x3000)=nil, 0x3000, 0x3000004, 0x110, r1, 0x43f17000) r2 = getpid() ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "1cc0b657144a976d54a18f664da51c5e649db0b5240bf86a2d035de6cddee5ba5e1553cd80d2b71e6ca35c64f31d790296364abfbfdafbc0473c58df588c46994451196e8a007d8ec06117ec4e284fcf256ba38dda9b736fbbfe4467b522b54bd354743a7221c1529367d29e6f1cb8333e32de9c068b18298cf519ddecc6560c5edfe5368d5abcee470931706ae7bcabc38858f430ca0296fe974b8a54f9446a0bc05622e2bb2c43a5c0481a07e7eea0177a83d609aa807d35fc3b1ede37b1bf10d852bc1395a047fb212a467d6e9f71d36171eb624a8096b9fb1a1976ba46c84384452ae08b03b03ebbc56f820ac0e7d174cd7bb46689df1a998a129cc87214", "e6ffbebd4706ba58dfcbbd793426a20ed61185c254cb609c1097a04567d1e0d7c7839942bed0e964c6af8efb18a10f96e377f7d85f035b2d857d5d598cf76375b1d6ac53452be71ff43f8fbb99efa18a55a1aea7c273df87d90951064527b9a66e1f5ea2021a194898cb6e7a06357eb79930d626cdc1eab549109327adb9e049789bbd58969b201f1c7d08b505d5721b54e285a2d4230e945a8e7a3b460c11c7412ca45640a5b4ea8cc51db8c2000d6c9274467d8b6c7646d496b930359778246e11b55246bef0c7510ff06d1ca13d0e4859bf0d05f9b715b4051d5f8f7d7f40ed2a69ea2cfcf9ce12e80132b60fd5aba03691df8682644227ed9b121d9ef81b51c666927d0a1a445b146e1700f9f4111ba9a77cd9016f965b99e09257235de9305f4f50bac3cf9f4a5feeaba70e2886a28aaa5b7e243e3f4e8acdf98392faadda65eed5c8795118b107b2b56f828db2fd8b47eabc3ffc4044983dabd85aa6f99ea0391bfc630345d47f26b06be3d86fca7918c9d00677ff1576b029d91b894b386be7f493701e4fa9678995bde4039f0852967e9fd3f4ff78a9c4a1fa56efe0a555601363353bfae382de4960b2af9fa1dda014123fe91b9fae7b698c167447deb3369911f23e14b5f04eec6f6776142bfa2adfdf3bd8ceb31865fccbfb86749ca315ae550e2b27809cc2c82217d57371b72dffe9c34784230b2c6c3e7766f88e5b62d58546cb7e4a0fdc3b299722ce24fb46e4c87946382293c52e27d84cb124b04aef77fb2bb514c9385265b894494c7bdfe60ab5dde81505a6b6ef2b5452662d8e5b9a39eaadc1594ab5cbf85f756141efcdef620364b57979c79fcb7f74b1bb488ef17698db0b011171d27a697d0a23628de75dff13dd74c48e814bbaa0f263bbd699b96a3eafa472c8cbe8b16dc22f4447f7ee9da3cc06c0168c205ab475b5a6dca986f3e83f07655d919ce0458154fd238742bc14043489247119591dbf0080a22e2b8781e70e29819e0acd0e77b5da035afba888244918fca64fb1eeafe952c17aff5bf44bbcce6bd23d16db562145e9d263a285b6fad709d534de16a0150e6ea59daed34941c4ee6c4be4f86cd5d9ed41fb8d9f15034011d3a1bc90dfda4e8ca2b84098481201e1d065e7950be4be4fe82f10e0bb3128c8cfe5f98173b6660ce30484f0d117385cc6c5d7f488f80d14defe7c119b5d6b6853c313b03bc7d46dd80aa65f7823917ac094dc9b1d5938228f600cf375ec9368942f6499dd5a741d51b6fc4a73cb206b9daad15c2a9dbf39fbd7f9b9c97c9df65bc5958cd3b1040dc149074faa7fbb30981ad25740bd9f621ba6c637807cb33db838957ee6bb70fa878a8890932ae5f40749882396d7c950a9a62b9df89837039d285606795fa96d73784a51efaedfd5e0a9efba414667f2946fffd39e105ec8c1c11ebc31b735a81e0d5e8507954438bc84d380f4402921ae8fb94d82c4aa5004e193c2aca26eeae0800f439063f0af794ab5e78b0ab92dc87a87f4b0ae0fcddd57d983382092145d1356907d7efa4ae0a4586a39a1b64fcf2a88a8fcfd8376d42cbd6550ebcd925ba97dc721779894ff759138ac81ab9ce61e42c9f33d52b9530d46004c6748b01dbb1621bcae3ef9212878b115bc417ed22f9f115019820f97f1fc388ab8f95973e585bb12143268eeba3bf7cdc27ef46fc5adbcc924465bfb178e8413884b91d9b481d23991ee85b721b59fa248495757879d650558b8673fc1e97b8752ae630a14e4da416b6103eb4f951835bea7a15b111b1758b0c46cf63a5e656fe822117888583fdb036def64a207a0112edabcebdb2163ba90b9b55215a2928074e3574c3510a05cac46495bd2ef0b7886a6c9e68808348ca85f96ff2b3965d0ddcb332c246fd3b07e19e10bf43330a57e0a647800980d8a5587cf7ebebbf980480f5cec7dfed2e9c1ebf0c2b825293a2ad90f8de94992ca61896c36bb067112fa0e4e5527b68bdbf41f231e3aa251e40ab731df2e9cd252e4760ede1aaaec677bc92483561f7029887648d46ee6853097cdd758f0f720187e7c852c026a76bfa13056fe162425e05a9e07f0d7b2abde4baadbf2e5a7f7beccfa82b51cbb92fa16669a0e53d1113125c45511111e1319468ca93a03cdad57de61bcc881db68ca3acc68eb6360c69614e05d86c8929e220f4a3eb73fbfd8bb8f402527f921ed5b81286146736bb58da085c1ffda39396a4ac48dfe78d2093994afe472b1d8696b21f3194231daf8e26b7d4040efe57bab38cf60a32cf80de30e47daa329b164e8da262972d785a0a2cf8d4354523faf39a969beeba6cb81979412f0d1557bd1cca915b98f9d2cdaf6ba1103b7eca3917bcb28d7c9dc1c6739ebc2fc7af8bedb72771f154436bf19504c2f57b23785e38e1eca984f0bfe1b6eacff4a7591d43770fe2a2881d5b71897b1127bfbbd3a17f86b3e167541df18633214f11436d7ff1327fbc897080664a5fdc61baa2ecdd04f3b9538c9ae65212ab3345c470d49a9cc12a0008ebfbfe0c1894750760378a92b482e3b2d981f29eadd70db75144da6276ea024f23911f86aa914f847dd99c336a4d980e9e4d9700e4607c482e956c08c18adcea1e25314759a979a3307ca0e2812c34f2a5e4933a8a7d7737b9f545463cd4948e8fb6bd41051feab7daac9c293c2961104943a40315c84df59f6e4c0231d01b6f4fc47282ddede6dc3c161f3587272fb4298d1b9825651112ef051746f47ff55fb39afcde552cccdf1ae2963597cdc9815dd434a6fd81bae166d30052b9e7ab7164ddee8dc5a9dc1029abb0f614a0eb712ca688279201e4936022f4c1107ba933d2bccbb0c8355332bb687bc09cb58dbf733db59491c0ba536551a344b1860188fe81e8eaaa1fc09cb2d937a4099e9f8f185dfd75e3d0f7353e17a384a5b9f2d5252beff8488e460b328c02bf1d249920a9a30d0c5652cc914026f94da9c3fe7d3baf50a95d39b18d6a1fd6f0718c2e7d26f90aaf2d656601c0f709448f47baeb28a24e04889045d3c0e3e7764ae0c0088a8d42763517726a59e982543bc24dd85704ac8e0b61d84ba92304e0ae7aaff2ec70580bcdcc2501e9b2acc154c8bb52d1d91b32400969100136bfcac3fa7a281f34793dc2c2d6ff7a212113e80a64e6f9b7de619fc1b6f00551d6aae955c655de2ce767cef4a6f177d6c87b976049e543ea45e3d8b23d535da94ab1739de836f5a9306a6cf7fd02bea92fa3329e09d11b64d2ba67973bddcbb38a95315b1af248e048d3ba9eb719a9f6504796ac16acda89e778971b90a318ef873a38871156f326a22329879f9968b27d453ed9ae19b11ffd6ce8c80d7f7e1d2bed06fd5089539dc20beca2fe326204ac982a81850a7914f52343a27cc6395b89bdd7730a947d2b40ebdb8647a728ab465e504d2ff399aa03fd07749be033f61ceca1c3c0dc15ee0580ee77ba06d1053bc67b7b64ce181db7a1a5477f657e9aa52dfd89bb61376503a5bfc7412305568cfcaf588909decc858e4dad8ab1ac164a6d4d492aae2aadbae439edc7566e5154088b04b5061a40afc545a5c0d307970c5f92b72463725f727b48e9c51c5864e03f2168edabd1f277859739c707e554eeb760fc1f57a5500bc03c1278a2b0dc16447cdcdc7fd0376e1e7d96bee0c55afc64e8722d435362b1898a7baf00d60da0a7a5d1caf413bed77a588cba5b01e47319fabc89115766a48f3d931b62c12161ed6308864f1b4c886c2bbd3fa11ba9b8b626ba00ad68768ad9044ad7baedecd02f77da582fc05d23897a21817a232b6a6372f97dc996a6b66a4fd415ec073d33c6a090410c8b769762baa0051426a805bd5299f88bb722ccd5170b49305c87df3465a874e41375698c3605ab1216ecccc7dd7f6103871132ba95b017e49b2e6a862f9b2171b2c72bc64602296079734202833af79176624c7d817ab7ba95b45861185e09f64c8d91c274b209c653183fb439ab910ce04b303a587e3931391668c6b1d5d3190f73b19b91f3128df48786ff9a3322baacc79f3d03148826c79dc683c52267712da9468a3bb7cefcaa10cf24359e18c09d44294462459f79042187a5a8048d94762a210c167970e7264bb693487e0acf2f541042fad2d6e9976be14f624d66eb375fef11f494fdf09a651718b699214b4662704d1109bafa3ca070993d21032ed984039f225d438409331a4ab40129a49a5d827405a8d27718c330203ee7a47190ac46107793d1828bd645a6b7704ce20f546145127dacc3bd5d4b1d050d62fabd9b1e4a2f31905bdab81b1c59f077475fb8580a4df018fa75b539bd8de7f91fbf2e13f1b4f0d036453ad245eac3bf416b50235189c5e50f1cd004ef1cb2a56fc965c97de7e32fd5477383b61fdc840db6ca67eb89594980ef589012045f393cfb5c8ce4e2d3f79fbdd3ed694af995d9d0a0149f73f0d427619a5fe09d2349eac314d9c07e395d84dde2d8f8a1c75c22e481fa6d2e9f1c31c33c90237014fdeb069d729dd9a9b3ac4493c0c9c19f80ca4de8d9699d9395c40e4b0cccea719d350a2decc8d9db64ccdeafba7b45c6326a957e1331223dc004b57b108d534a4034e112c9ae314549ee10c18966ea3f851cf82b854a5b5f4ebf6f5c05bd710f900d4f22eddb6693f7dfff17b0ce1682c6f99163f55e1e351da7891e7ecbbc9afcf2bde71b02aa43143fa28b629c577673b0327c033afd0e312cbe246f47fe5fb7c2b6d4ec595734d7fbfbe997e25e7dc62c810c106f2dffc7cb03b209b341414e36c4d280bdfda2c9c2f4215b134cfbe0afaf47da1e5f9a8e8d441634f5b754efe257627299517dc7374fa14e898c3e202a35f34f323eb77a96ab36b99ace84e06ba6a62d9c60412d00c94a3c3a6692cf9ab295da75a251d08b3a1b1795fc2900be73947305215c904fd4cd7f425b03423a7923725f1e795468ee6655627fd36ab894c68a39aaa324e6507c1e58fb6e097f990165b481082ee149f210eba4511abc6cd74d79ef494fd9248664bc46a24ae67fbf7ffed5218e24706fb0fdef29b1908da4f317ab61c926daa35932cce63f9750406b20bb7cba2cf2e2bb9173fbf8145c888c8acece80bcf2f3db16b83b41b7271819fed703f885594706acefb17873b7af564f90ce5ba2731ede53a3b888adef1cecceae06ad3f783deed90b460b9fddc3398f1f3fc0d3c8165c1fc976965b328ac40c5f468ce40754805b3c31adf99fff6127156e8cc21a3eecd967428297261e91a6e5b9c20c69595c30899fdfcaf74f8abd59a9e19e5f1774628f91f2d16e9833f7060583f1da24ae0c7594fe054f42f3f0887bfe225bc75ef729cc065f4a9f23b8c8b6d4e822e0af8e6df949100d1b9f3f6e44a463851acbd"}) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)={0x0, 0x0, 0x101}) rt_tgsigqueueinfo(0x0, r2, 0x0, &(0x7f00000013c0)={0x0, 0x0, 0x8001}) 07:51:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1419.703465][ T1027] loop5: p1 p2 p3 p4 [ 1419.707927][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1419.714008][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1419.723189][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1419.743589][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:51:57 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:52:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x400c6615, 0x0) 07:52:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:52:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:52:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:52:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x400c6615, 0x0) 07:52:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:00 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1422.721823][ T1027] loop5: p1 p2 p3 p4 [ 1422.726048][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1422.732025][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1422.743582][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1422.751818][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:01 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:01 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:52:03 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) 07:52:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1425.742146][ T1027] loop5: p1 p2 p3 p4 [ 1425.746542][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1425.752603][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1425.775936][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1425.785268][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:04 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) 07:52:04 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) 07:52:04 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:04 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:52:06 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1428.768474][ T1027] loop5: p1 p2 p3 p4 [ 1428.774987][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1428.781011][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1428.812503][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1428.827543][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:07 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 07:52:09 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:09 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1431.789045][ T1027] loop5: p1 p2 p3 p4 [ 1431.793145][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1431.799124][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1431.807765][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1431.823751][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:52:10 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1431.851951][ T1027] loop5: p1 p2 p3 p4 [ 1431.864595][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1431.870651][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1431.880416][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1431.888291][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:10 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:12 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:12 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:12 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:12 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r0, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:12 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r0, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:13 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r0, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:52:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:13 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:13 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1434.933415][ T1027] loop5: p1 p2 p3 p4 [ 1434.937450][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1434.943443][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1434.952981][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1434.960973][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:15 executing program 1: r0 = syz_io_uring_setup(0x0, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:15 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:15 executing program 1: r0 = syz_io_uring_setup(0x3280, 0x0, &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:15 executing program 1: r0 = syz_io_uring_setup(0x3280, 0x0, &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:16 executing program 1: r0 = syz_io_uring_setup(0x3280, 0x0, &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7, 0x7) 07:52:16 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:16 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:16 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:16 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:16 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1437.973384][ T1027] loop5: p1 p2 p3 p4 [ 1437.977569][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1437.983642][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1437.993891][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1438.001977][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:18 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:18 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:19 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:19 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1440.987477][ T1027] loop5: p1 p2 p3 p4 [ 1440.992124][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1440.998151][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1441.013088][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1441.023173][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:21 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:21 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x0, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:22 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, 0x0, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1443.999347][ T1027] loop5: p1 p2 p3 p4 [ 1444.009498][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1444.015582][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1444.030342][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:22 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1444.046099][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:25 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1447.027825][ T1027] loop5: p1 p2 p3 p4 [ 1447.032162][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1447.038329][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1447.049800][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1447.061459][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:25 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:28 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1450.036705][ T1027] loop5: p1 p2 p3 p4 [ 1450.040826][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1450.046810][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1450.055038][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1450.078117][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:28 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:28 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:31 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:31 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:31 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1453.073805][ T1027] loop5: p1 p2 p3 p4 [ 1453.077855][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1453.083838][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1453.093613][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1453.101823][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:31 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1453.147100][ T1027] loop5: p1 p2 p3 p4 [ 1453.151411][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1453.157522][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1453.174620][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1453.189486][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:34 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:34 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:34 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:34 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:34 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1456.138050][ T1027] loop5: p1 p2 p3 p4 [ 1456.142098][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1456.148088][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1456.158284][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1456.166309][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1456.316777][ T1027] loop5: p1 p2 p3 p4 [ 1456.323953][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1456.329944][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1456.337892][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1456.346697][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1456.399351][ T1027] loop5: p1 p2 p3 p4 [ 1456.403639][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1456.409618][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1456.417814][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1456.425296][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:37 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d5c160fa73f4e9461103fa13cdce25381a61500f76", 0xe6}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) [ 1458.939534][ T1027] loop5: p1 p2 p3 p4 [ 1458.943855][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1458.949851][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1458.957758][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1458.965665][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated [ 1459.019095][ T1027] loop5: p1 p2 p3 p4 [ 1459.024607][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1459.030628][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1459.039672][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1459.047568][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:37 executing program 1: syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1459.075687][ T1027] loop5: p1 p2 p3 p4 [ 1459.081338][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1459.087343][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1459.095537][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1459.103507][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:37 executing program 1: syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:40 executing program 1: syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x4510, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:40 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:40 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1462.070874][ T1027] loop5: p1 p2 p3 p4 [ 1462.075075][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1462.081066][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1462.089693][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1462.097555][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:43 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:43 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1465.121844][ T1027] loop5: p1 p2 p3 p4 [ 1465.126110][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1465.132094][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1465.143445][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1465.151367][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1468.138961][ T1027] loop5: p1 p2 p3 p4 [ 1468.143261][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1468.149226][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1468.158166][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1468.166255][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:46 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:46 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:46 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:46 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:49 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:49 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1471.166109][ T1027] loop5: p1 p2 p3 p4 [ 1471.170381][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1471.176449][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1471.184287][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1471.192531][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:49 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:49 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:49 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:50 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:52 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1474.172252][ T1027] loop5: p1 p2 p3 p4 [ 1474.176294][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1474.182298][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1474.193449][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1474.201708][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:52 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:55 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:52:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1477.184362][ T1027] loop5: p1 p2 p3 p4 [ 1477.188443][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1477.194543][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1477.202812][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1477.210313][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:55 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, 0x0, 0x0, 0xd9f, 0x0) 07:52:55 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, 0x0, 0x0, 0xd9f, 0x0) 07:52:55 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, 0x0, 0x0, 0xd9f, 0x0) 07:52:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:52:58 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0x0, 0x0) 07:52:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1480.192186][ T1027] loop5: p1 p2 p3 p4 [ 1480.196236][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1480.202245][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1480.211089][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1480.219426][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:52:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:52:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 07:53:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0x0, 0x0) 07:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1483.207623][ T1027] loop5: p1 p2 p3 p4 [ 1483.211827][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1483.217951][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1483.229389][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1483.237742][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:01 executing program 1: r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0x0, 0x0) 07:53:01 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1483.619599][T15967] FAULT_INJECTION: forcing a failure. [ 1483.619599][T15967] name failslab, interval 1, probability 0, space 0, times 0 [ 1483.632421][T15967] CPU: 1 PID: 15967 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1483.642550][T15967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1483.652577][T15967] Call Trace: [ 1483.655832][T15967] dump_stack+0x137/0x19d [ 1483.660149][T15967] should_fail+0x23c/0x250 [ 1483.664538][T15967] __should_failslab+0x81/0x90 [ 1483.669273][T15967] should_failslab+0x5/0x20 [ 1483.673866][T15967] kmem_cache_alloc_bulk+0x40/0x380 [ 1483.679146][T15967] io_submit_sqes+0x515/0xaf0 [ 1483.683809][T15967] __se_sys_io_uring_enter+0x217/0xb20 [ 1483.689268][T15967] ? fput+0x2d/0x130 [ 1483.693200][T15967] __x64_sys_io_uring_enter+0x74/0x80 [ 1483.698572][T15967] do_syscall_64+0x34/0x50 [ 1483.702970][T15967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1483.708908][T15967] RIP: 0033:0x466459 [ 1483.712776][T15967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1483.732443][T15967] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1483.740850][T15967] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1483.748797][T15967] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 [ 1483.756788][T15967] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1483.764747][T15967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1483.772765][T15967] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000 [ 1483.780798][ C1] ================================================================== [ 1483.788865][ C1] BUG: KCSAN: data-race in __do_munmap / acct_account_cputime [ 1483.796302][ C1] [ 1483.798605][ C1] write to 0xffff8881507e7cc8 of 8 bytes by task 15969 on cpu 0: [ 1483.806288][ C1] __do_munmap+0xfa4/0x1340 [ 1483.810784][ C1] mmap_region+0x58a/0x13e0 [ 1483.815265][ C1] do_mmap+0x77d/0xc90 [ 1483.819309][ C1] vm_mmap_pgoff+0xfc/0x1d0 [ 1483.823795][ C1] ksys_mmap_pgoff+0x2a8/0x380 [ 1483.828530][ C1] do_syscall_64+0x34/0x50 [ 1483.832920][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1483.838787][ C1] [ 1483.841199][ C1] read to 0xffff8881507e7cc8 of 8 bytes by interrupt on cpu 1: [ 1483.848714][ C1] acct_account_cputime+0x15a/0x1a0 [ 1483.853886][ C1] update_process_times+0x5c/0x150 [ 1483.858972][ C1] tick_sched_timer+0x191/0x210 [ 1483.863811][ C1] __run_hrtimer+0x160/0x480 [ 1483.868377][ C1] hrtimer_interrupt+0x380/0xaf0 [ 1483.873295][ C1] __sysvec_apic_timer_interrupt+0x6f/0x1c0 [ 1483.879164][ C1] sysvec_apic_timer_interrupt+0x64/0x80 [ 1483.884895][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1483.890856][ C1] dump_stack+0x17d/0x19d [ 1483.895253][ C1] should_fail+0x23c/0x250 [ 1483.899646][ C1] __should_failslab+0x81/0x90 [ 1483.904386][ C1] should_failslab+0x5/0x20 [ 1483.908863][ C1] kmem_cache_alloc_bulk+0x40/0x380 [ 1483.914030][ C1] io_submit_sqes+0x515/0xaf0 [ 1483.918683][ C1] __se_sys_io_uring_enter+0x217/0xb20 [ 1483.924133][ C1] __x64_sys_io_uring_enter+0x74/0x80 [ 1483.929481][ C1] do_syscall_64+0x34/0x50 [ 1483.933956][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1483.939824][ C1] [ 1483.942121][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1483.948240][ C1] CPU: 1 PID: 15967 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1483.958448][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1483.968563][ C1] ================================================================== 07:53:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:53:04 executing program 1 (fault-call:4 fault-nth:1): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1486.221055][ T1027] loop5: p1 p2 p3 p4 [ 1486.223686][T15976] FAULT_INJECTION: forcing a failure. [ 1486.223686][T15976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.225324][ T1027] loop5: p1 start 1 is beyond EOD, [ 1486.238079][T15976] CPU: 1 PID: 15976 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1486.238098][T15976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.243272][ T1027] truncated [ 1486.253391][T15976] Call Trace: [ 1486.253398][T15976] dump_stack+0x137/0x19d [ 1486.263450][ T1027] loop5: p2 size 1073741824 extends beyond EOD, [ 1486.266527][T15976] should_fail+0x23c/0x250 [ 1486.269777][ T1027] truncated [ 1486.276207][ T1027] loop5: p3 size 1912633224 extends beyond EOD, [ 1486.280475][T15976] should_fail_usercopy+0x16/0x20 [ 1486.280492][T15976] _copy_from_user+0x1c/0xd0 [ 1486.280508][T15976] __copy_msghdr_from_user+0x44/0x350 [ 1486.284895][ T1027] truncated [ 1486.285622][ T1027] loop5: p4 size 32768 extends beyond EOD, [ 1486.287973][T15976] ? __wake_up+0x8d/0xc0 [ 1486.287989][T15976] io_recvmsg_copy_hdr+0x91/0x350 [ 1486.294311][ T1027] truncated [ 1486.299292][T15976] io_issue_sqe+0x25c5/0x6080 [ 1486.335075][T15976] ? __list_del_entry_valid+0x54/0xc0 [ 1486.340445][T15976] ? __inc_numa_state+0x10/0x50 [ 1486.345284][T15976] ? rmqueue_pcplist+0x152/0x190 [ 1486.350216][T15976] ? rmqueue+0x43/0xcf0 [ 1486.354362][T15976] ? mntput_no_expire+0x64/0x740 [ 1486.359291][T15976] ? mntput+0x45/0x70 [ 1486.363265][T15976] ? get_page_from_freelist+0x4fe/0x7b0 07:53:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1486.368832][T15976] ? fget_many+0x178/0x1a0 [ 1486.373228][T15976] __io_queue_sqe+0xe9/0x3a0 [ 1486.377837][T15976] io_queue_sqe+0x6d/0x160 [ 1486.382293][T15976] io_submit_sqe+0x15c7/0x30c0 [ 1486.387131][T15976] ? kmem_cache_alloc_bulk+0x239/0x380 [ 1486.392568][T15976] io_submit_sqes+0x61f/0xaf0 [ 1486.397241][T15976] __se_sys_io_uring_enter+0x217/0xb20 [ 1486.402701][T15976] ? fput+0x2d/0x130 [ 1486.406592][T15976] __x64_sys_io_uring_enter+0x74/0x80 [ 1486.411975][T15976] do_syscall_64+0x34/0x50 07:53:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1486.416379][T15976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1486.422348][T15976] RIP: 0033:0x466459 [ 1486.426241][T15976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.445850][T15976] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1486.454309][T15976] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1486.462336][T15976] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 07:53:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1486.470298][T15976] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.478271][T15976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.486237][T15976] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000 07:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:04 executing program 1 (fault-call:4 fault-nth:2): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1486.594273][T16025] FAULT_INJECTION: forcing a failure. [ 1486.594273][T16025] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.606909][T16025] CPU: 0 PID: 16025 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1486.617045][T16025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.627137][T16025] Call Trace: [ 1486.630394][T16025] dump_stack+0x137/0x19d [ 1486.634738][T16025] should_fail+0x23c/0x250 [ 1486.639127][T16025] __should_failslab+0x81/0x90 [ 1486.643918][T16025] ? io_issue_sqe+0x52b5/0x6080 [ 1486.648779][T16025] should_failslab+0x5/0x20 [ 1486.653261][T16025] __kmalloc+0x66/0x360 [ 1486.657443][T16025] io_issue_sqe+0x52b5/0x6080 [ 1486.662094][T16025] ? __list_del_entry_valid+0x54/0xc0 [ 1486.667527][T16025] ? __inc_numa_state+0x10/0x50 [ 1486.672396][T16025] ? rmqueue_pcplist+0x152/0x190 [ 1486.677306][T16025] ? rmqueue+0x43/0xcf0 [ 1486.681442][T16025] ? mntput+0x45/0x70 [ 1486.685401][T16025] ? get_page_from_freelist+0x4fe/0x7b0 [ 1486.691067][T16025] ? fget_many+0x178/0x1a0 [ 1486.695459][T16025] __io_queue_sqe+0xe9/0x3a0 [ 1486.700085][T16025] io_queue_sqe+0x6d/0x160 [ 1486.704481][T16025] io_submit_sqe+0x15c7/0x30c0 [ 1486.709237][T16025] ? kmem_cache_alloc_bulk+0x239/0x380 [ 1486.714730][T16025] io_submit_sqes+0x61f/0xaf0 [ 1486.719458][T16025] __se_sys_io_uring_enter+0x217/0xb20 [ 1486.724924][T16025] ? fput+0x2d/0x130 [ 1486.728803][T16025] __x64_sys_io_uring_enter+0x74/0x80 [ 1486.734149][T16025] do_syscall_64+0x34/0x50 [ 1486.738544][T16025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1486.744425][T16025] RIP: 0033:0x466459 [ 1486.748289][T16025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.768049][T16025] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1486.776488][T16025] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1486.784436][T16025] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 [ 1486.792453][T16025] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.800406][T16025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.808347][T16025] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000 07:53:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1489.232117][ T1027] loop5: p1 p2 p3 p4 [ 1489.236151][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1489.242172][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1489.252306][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1489.260021][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:53:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:07 executing program 1 (fault-call:4 fault-nth:3): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1489.410341][T16053] FAULT_INJECTION: forcing a failure. [ 1489.410341][T16053] name failslab, interval 1, probability 0, space 0, times 0 [ 1489.423013][T16053] CPU: 0 PID: 16053 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1489.433182][T16053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.443223][T16053] Call Trace: [ 1489.446490][T16053] dump_stack+0x137/0x19d [ 1489.450926][T16053] should_fail+0x23c/0x250 [ 1489.455321][T16053] __should_failslab+0x81/0x90 07:53:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1489.460117][T16053] ? io_arm_poll_handler+0x15e/0x420 [ 1489.465396][T16053] should_failslab+0x5/0x20 [ 1489.469901][T16053] kmem_cache_alloc_trace+0x49/0x320 [ 1489.475165][T16053] io_arm_poll_handler+0x15e/0x420 [ 1489.480264][T16053] __io_queue_sqe+0x133/0x3a0 [ 1489.484926][T16053] io_queue_sqe+0x6d/0x160 [ 1489.489404][T16053] io_submit_sqe+0x15c7/0x30c0 [ 1489.494154][T16053] ? kmem_cache_alloc_bulk+0x239/0x380 [ 1489.499609][T16053] io_submit_sqes+0x61f/0xaf0 [ 1489.504358][T16053] __se_sys_io_uring_enter+0x217/0xb20 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1489.509807][T16053] ? fput+0x2d/0x130 [ 1489.513698][T16053] __x64_sys_io_uring_enter+0x74/0x80 [ 1489.519072][T16053] do_syscall_64+0x34/0x50 [ 1489.523566][T16053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1489.529456][T16053] RIP: 0033:0x466459 [ 1489.533334][T16053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 07:53:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1489.553036][T16053] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1489.561447][T16053] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1489.569423][T16053] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 [ 1489.577381][T16053] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1489.585339][T16053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1489.593386][T16053] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000 07:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:53:10 executing program 1 (fault-call:4 fault-nth:4): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1492.265585][ T1027] loop5: p1 p2 p3 p4 [ 1492.269715][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1492.275689][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 1492.284398][T16100] FAULT_INJECTION: forcing a failure. [ 1492.284398][T16100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1492.290184][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1492.297593][T16100] CPU: 1 PID: 16100 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1492.305012][ T1027] loop5: p4 size 32768 extends beyond EOD, [ 1492.314810][T16100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.314830][T16100] Call Trace: [ 1492.314837][T16100] dump_stack+0x137/0x19d [ 1492.320724][ T1027] truncated [ 1492.330729][T16100] should_fail+0x23c/0x250 [ 1492.345809][T16100] should_fail_usercopy+0x16/0x20 [ 1492.350842][T16100] _copy_from_user+0x1c/0xd0 [ 1492.355422][T16100] __copy_msghdr_from_user+0x44/0x350 [ 1492.360771][T16100] io_recvmsg_copy_hdr+0x91/0x350 [ 1492.365808][T16100] io_issue_sqe+0x25c5/0x6080 [ 1492.370501][T16100] ? __io_queue_proc+0x99/0x260 [ 1492.375546][T16100] ? io_async_queue_proc+0x3f/0x50 [ 1492.380665][T16100] ? __io_sqe_files_scm+0x3d0/0x3d0 [ 1492.385856][T16100] ? unix_dgram_poll+0x26f/0x3e0 [ 1492.390774][T16100] ? sock_poll+0x23e/0x260 [ 1492.395260][T16100] ? unix_dgram_connect+0x850/0x850 [ 1492.400444][T16100] ? __io_arm_poll_handler+0x2af/0x420 [ 1492.405906][T16100] ? io_arm_poll_handler+0x36b/0x420 [ 1492.411178][T16100] ? __io_sqe_files_scm+0x3d0/0x3d0 [ 1492.416435][T16100] __io_queue_sqe+0xe9/0x3a0 [ 1492.421137][T16100] io_queue_sqe+0x6d/0x160 [ 1492.425533][T16100] io_submit_sqe+0x15c7/0x30c0 [ 1492.430373][T16100] ? kmem_cache_alloc_bulk+0x239/0x380 [ 1492.435805][T16100] io_submit_sqes+0x61f/0xaf0 [ 1492.440457][T16100] __se_sys_io_uring_enter+0x217/0xb20 [ 1492.445891][T16100] ? fput+0x2d/0x130 [ 1492.449761][T16100] __x64_sys_io_uring_enter+0x74/0x80 [ 1492.455105][T16100] do_syscall_64+0x34/0x50 [ 1492.459497][T16100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1492.465408][T16100] RIP: 0033:0x466459 [ 1492.469274][T16100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1492.488852][T16100] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 1492.497237][T16100] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1492.505182][T16100] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 07:53:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd1", 0x6c}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x7, 0x7) 07:53:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d523be91b5877341e0e1dcc2025aa18c9228103366e1000031d322dbecfa63da445b8bef5bd96f5f39f50bd2d4edccbf938604bf58b23ac4edcce41224ddeacb1f630e4052d0d6c20a45c772242f63a6bf41a08f4951d60a703816", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:53:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd90654859cff15f715134d82ce9c0952d64410b643583fa617057642a7c52ca392aeb56b80d6b89affd171c1c2d5", 0x70}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1492.513126][T16100] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.521074][T16100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1492.529034][T16100] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000 [ 1492.550843][ T1027] loop5: p1 p2 p3 p4 [ 1492.555221][ T1027] loop5: p1 start 1 is beyond EOD, truncated [ 1492.561210][ T1027] loop5: p2 size 1073741824 extends beyond EOD, truncated 07:53:10 executing program 1 (fault-call:4 fault-nth:5): r0 = syz_io_uring_setup(0x3280, &(0x7f0000000040), &(0x7f0000ee4000/0x4000)=nil, &(0x7f00006d7000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1492.587630][ T1027] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 1492.597081][ T1027] loop5: p4 size 32768 extends beyond EOD, truncated 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1492.678774][T16136] FAULT_INJECTION: forcing a failure. [ 1492.678774][T16136] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.691600][T16136] CPU: 1 PID: 16136 Comm: syz-executor.1 Tainted: G W 5.12.0-rc7-syzkaller #0 [ 1492.701773][T16136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.711816][T16136] Call Trace: [ 1492.715077][T16136] dump_stack+0x137/0x19d [ 1492.719382][T16136] should_fail+0x23c/0x250 [ 1492.723774][T16136] __should_failslab+0x81/0x90 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1492.728537][T16136] ? io_issue_sqe+0x52b5/0x6080 [ 1492.733555][T16136] should_failslab+0x5/0x20 [ 1492.738087][T16136] __kmalloc+0x66/0x360 [ 1492.742243][T16136] io_issue_sqe+0x52b5/0x6080 [ 1492.746907][T16136] ? __io_queue_proc+0x99/0x260 [ 1492.751754][T16136] ? io_async_queue_proc+0x3f/0x50 [ 1492.756936][T16136] ? __io_sqe_files_scm+0x3d0/0x3d0 [ 1492.762181][T16136] ? unix_dgram_poll+0x26f/0x3e0 [ 1492.767133][T16136] ? sock_poll+0x23e/0x260 [ 1492.771588][T16136] ? unix_dgram_connect+0x850/0x850 07:53:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1492.776788][T16136] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 1492.782592][T16136] ? io_arm_poll_handler+0x36b/0x420 [ 1492.787877][T16136] ? __io_sqe_files_scm+0x3d0/0x3d0 [ 1492.793065][T16136] __io_queue_sqe+0xe9/0x3a0 [ 1492.797650][T16136] io_queue_sqe+0x6d/0x160 [ 1492.802052][T16136] io_submit_sqe+0x15c7/0x30c0 [ 1492.806836][T16136] ? kmem_cache_alloc_bulk+0x239/0x380 [ 1492.812287][T16136] io_submit_sqes+0x61f/0xaf0 [ 1492.816953][T16136] __se_sys_io_uring_enter+0x217/0xb20 [ 1492.822438][T16136] ? fput+0x2d/0x130 [ 1492.826328][T16136] __x64_sys_io_uring_enter+0x74/0x80 [ 1492.831692][T16136] do_syscall_64+0x34/0x50 [ 1492.836121][T16136] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1492.842113][T16136] RIP: 0033:0x466459 [ 1492.846054][T16136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1492.865644][T16136] RSP: 002b:00007fb64e7ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa 07:53:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126825deaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26e45958dc387cf4c2e1fea4b7a3d", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 1492.874090][T16136] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 1492.882196][T16136] RDX: 0000000000000000 RSI: 0000000000004510 RDI: 0000000000000003 [ 1492.890182][T16136] RBP: 00007fb64e7ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.898124][T16136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1492.906119][T16136] R13: 00007ffe5d72a4ef R14: 00007fb64e7ff300 R15: 0000000000022000