s 0 [ 1330.559166][T19835] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1330.571204][T19838] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1330.583577][T19839] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1330.595400][T19830] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1330.596295][T19840] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1330.654235][T19789] IPVS: ftp: loaded support on port[0] = 21 [ 1330.668999][T19830] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 13:32:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x7}, 0x2a0}) 13:32:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) sched_getparam(r2, &(0x7f0000000000)) r3 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) 13:32:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$packet(r2, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000001400)={r5, 0x1, 0x6, @dev={[], 0xd}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r7 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x353880) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000080)=0x8001) fallocate(r6, 0x10, 0x0, 0x200) 13:32:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x145}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff5f, 0x0, 0xffffff32}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:32:15 executing program 5: 13:32:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x30010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1331.079491][T19852] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1331.088901][T19852] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:15 executing program 5: [ 1331.119940][T19852] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r6 = dup2(r5, r4) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r10}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r10}}, 0x18) r11 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0xc) r12 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r12, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) [ 1331.177387][T19861] IPVS: ftp: loaded support on port[0] = 21 13:32:15 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/131) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) r4 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000000)='dummy0\x00', 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) fgetxattr(r6, &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f0000001680)=""/158, 0x1da) fallocate(r5, 0x10, 0x0, 0x200) 13:32:15 executing program 5: 13:32:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x36010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1331.979265][T19897] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1332.012304][T19897] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1332.046176][T19897] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1332.272220][T19910] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1332.285039][T19911] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1332.285178][ T2503] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1332.302369][T19912] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1332.309166][T19897] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1332.319491][T19912] buffer_io_error: 637 callbacks suppressed [ 1332.319504][T19912] Buffer I/O error on dev loop3p6, logical block 4080, async page read [ 1332.327258][ T2503] Buffer I/O error on dev loop3p4, logical block 4080, async page read [ 1332.349910][ T2503] Buffer I/O error on dev loop3p6, logical block 4094, async page read [ 1332.358327][ T2503] Buffer I/O error on dev loop3p4, logical block 4094, async page read [ 1332.358470][T19907] Buffer I/O error on dev loop3p5, logical block 33008, async page read [ 1332.366687][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1332.384143][ T2503] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1332.385701][T19910] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1332.392561][ T2503] Buffer I/O error on dev loop3p2, logical block 33008, async page read [ 1332.408750][ T2503] Buffer I/O error on dev loop3p4, logical block 1, async page read [ 1332.436033][T19861] IPVS: ftp: loaded support on port[0] = 21 [ 1332.468371][T19913] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 13:32:16 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x8}, 0x2a0}) 13:32:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000000)=0x9) r2 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) 13:32:16 executing program 5: [ 1332.686278][T19921] IPVS: ftp: loaded support on port[0] = 21 [ 1332.728436][ T9713] tipc: TX() has been purged, node left! [ 1332.734698][ T9713] tipc: TX() has been purged, node left! [ 1332.748806][ T9713] tipc: TX() has been purged, node left! [ 1332.758497][ T9713] tipc: TX() has been purged, node left! [ 1333.126403][T19921] IPVS: ftp: loaded support on port[0] = 21 13:32:18 executing program 2: 13:32:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = semget$private(0x0, 0x2, 0x2) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000300)=[0x1]) semtimedop(r4, &(0x7f0000000340)=[{0x0, 0x400, 0x1000}, {0x1, 0x8, 0x1000}, {0x3, 0x6, 0x3c00}, {0x3, 0x0, 0x1000}, {0x830e8804f2b7be12, 0x1f}, {0x2, 0xd472, 0x400}], 0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000080)=""/207) 13:32:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x36020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget(0x3, 0x3000, 0x80, &(0x7f0000006000/0x3000)=nil) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) fcntl$setstatus(r3, 0x4, 0x0) shmctl$IPC_RMID(r2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) 13:32:18 executing program 5: 13:32:18 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0xa}, 0x2a0}) [ 1334.186319][T19979] IPVS: ftp: loaded support on port[0] = 21 [ 1334.241995][T19980] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:18 executing program 5: 13:32:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000000)={0x0, 0x6a, 0x3, 0x17, 0xd, "0e3320e92b47270cea787075aa60d0120f7cc3"}) 13:32:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) chmod(&(0x7f0000000000)='./file0\x00', 0x29) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1334.262546][T19980] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1334.335496][T19980] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:18 executing program 2: 13:32:18 executing program 5: 13:32:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x234bbd91ad03a06f, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x7fffffff, 0x9, 0x4, 0x10, 0x0, {}, {0x7, 0x1, 0x3, 0xba, 0x7f, 0x1, "b44801aa"}, 0x8ae1, 0x0, @userptr=0x9, 0xffffffff, 0x0, r2}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r3}}, 0x18) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) 13:32:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x6, 0x6, 0x4, 0x400, 0x7f, {0x77359400}, {0x1, 0x8, 0x1, 0x12, 0x1, 0xff, "c004e2dc"}, 0x0, 0x1, @offset=0x2000, 0x2, 0x0, 0xffffffffffffffff}) write$P9_RREADDIR(r4, &(0x7f0000000100)={0xa6, 0x29, 0x2, {0x0, [{{0x8, 0x4, 0x7}, 0x5, 0xf9, 0x7, './file0'}, {{0x10, 0x4, 0x6}, 0x0, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0x2, 0x5, 0x7, './file0'}, {{0x82, 0x3, 0x7}, 0x8ab, 0xe1, 0x7, './file0'}, {{0x5d, 0x2, 0x2}, 0x1, 0x8, 0x7, './file0'}]}}, 0xa6) 13:32:19 executing program 2: [ 1334.831543][T20010] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1334.837896][T20010] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1334.857954][T20010] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x38010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:19 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000080)=0xffffffffffff9f57) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget(0x1, 0x3000, 0x0, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000000)=0xc328) 13:32:19 executing program 5: [ 1335.226875][T20032] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1335.248980][T20032] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1335.269913][T20032] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1335.472379][T19979] IPVS: ftp: loaded support on port[0] = 21 13:32:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x48}, 0x2a0}) 13:32:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0xfffffffffffffffc, 0x200) 13:32:20 executing program 5: 13:32:20 executing program 1: 13:32:20 executing program 2: 13:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x38020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:20 executing program 5: [ 1335.878398][T20058] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:20 executing program 1: 13:32:20 executing program 2: [ 1335.931203][T20058] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1336.045862][T20072] IPVS: ftp: loaded support on port[0] = 21 [ 1336.059940][T20058] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:20 executing program 1: 13:32:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) [ 1336.159447][ T9713] tipc: TX() has been purged, node left! [ 1336.165627][ T9713] tipc: TX() has been purged, node left! [ 1336.197528][ T9713] tipc: TX() has been purged, node left! [ 1336.249901][ T9713] tipc: TX() has been purged, node left! [ 1336.286146][ T9713] tipc: TX() has been purged, node left! [ 1336.487188][T20092] device lo entered promiscuous mode [ 1336.620768][T20089] device lo left promiscuous mode [ 1336.769091][T20092] device lo entered promiscuous mode [ 1336.940391][T20072] IPVS: ftp: loaded support on port[0] = 21 13:32:21 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x4c}, 0x2a0}) 13:32:21 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/130, 0xfffffe4d}) clone(0x28b84900, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "3bec520e0000000000050000110000000100"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 13:32:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}}}}}]}, 0x48}}, 0x0) 13:32:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x6, 0x238000) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x82, 0x3, 0x1}}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) 13:32:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3e030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:21 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:32:21 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x0) 13:32:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1337.338878][T20122] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1337.348943][T20122] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1337.466687][T20133] IPVS: ftp: loaded support on port[0] = 21 [ 1337.481656][T20122] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000380)=""/188) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000b0}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x40000) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) 13:32:22 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/131) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) r4 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000000)='dummy0\x00', 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}, {}], {}, [{}]}, 0x3c, 0x0) fgetxattr(r6, &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f0000001680)=""/158, 0x1da) fallocate(r5, 0x10, 0x0, 0x200) 13:32:22 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6}, 0x2a0}) 13:32:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1000000000000005) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) [ 1338.075503][T20159] IPVS: ftp: loaded support on port[0] = 21 [ 1338.716084][T20133] IPVS: ftp: loaded support on port[0] = 21 13:32:23 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x5}, 0x2a0}) 13:32:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3f000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:23 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x2}, 0x2a0}) 13:32:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x60}, 0x2a0}) 13:32:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="010000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0xc) r5 = open(0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000200)=@netrom={'nr', 0x0}, 0x10) ioctl$MON_IOCT_RING_SIZE(r5, 0x40086602, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r8, 0x84, 0x72, &(0x7f0000000000)={r9}, &(0x7f00000000c0)=0xc) r10 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r10, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r10, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r10, 0x84, 0xf, &(0x7f0000000100)={r9, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000300)={r9, 0x7fffffff}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={r11, @in6={{0xa, 0x4e22, 0x20, @dev={0xfe, 0x80, [], 0xe}, 0x1}}, 0x5, 0x7}, &(0x7f0000000480)=0x90) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000100)={r4, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x9, 0x0, 0xece7620766250670, 0x9, 0x6, 0x9, 0x5, 0x6, r4}, &(0x7f00000000c0)=0x20) pipe(&(0x7f0000000240)={0xffffffffffffffff}) open(&(0x7f00000002c0)='./file0\x00', 0x140, 0x2) ioctl$KVM_SET_ONE_REG(r12, 0x4010aeac, &(0x7f0000000280)={0x4d, 0x401}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) r14 = socket$inet6_udp(0xa, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$sock_SIOCGIFBR(r15, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r15, 0x80184132, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r17 = socket$inet_udplite(0x2, 0x2, 0x88) r18 = socket$inet6_udp(0xa, 0x2, 0x0) r19 = fcntl$dupfd(r18, 0x0, r17) ioctl$sock_SIOCGIFBR(r19, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$EVIOCGVERSION(r19, 0x80044501, &(0x7f0000000000)=""/29) fallocate(r16, 0x0, 0x0, 0x204) [ 1339.041892][T20184] IPVS: ftp: loaded support on port[0] = 21 [ 1339.050879][T20187] IPVS: ftp: loaded support on port[0] = 21 [ 1339.135910][T20196] IPVS: ftp: loaded support on port[0] = 21 [ 1339.153533][T20185] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1339.190054][T20185] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x85', 0x241, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x4) ioctl$TUNGETFILTER(r4, 0x801054db, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x8800) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'yam0\x00'}) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) close(r3) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000140)='yam0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000200)=0xe8) recvmsg(0xffffffffffffffff, 0x0, 0x1) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) write$cgroup_int(r4, &(0x7f00000000c0), 0x12) [ 1339.232281][T20185] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x600003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x4000, 0x0) getsockopt$packet_int(r3, 0x107, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r4 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$sock_SIOCGIFBR(r12, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup2(r13, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$BLKRAGET(r14, 0x1263, &(0x7f0000000180)) r15 = fcntl$dupfd(r1, 0x0, r0) munlockall() ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r16, 0x10, 0x0, 0x200) [ 1339.558889][T20214] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1339.598975][T20214] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1339.681083][T20214] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x40000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000000080)={0x3, 0x1, @raw_data=[0x8, 0x3, 0x6db3, 0x10000, 0x7fff, 0x7fffffff, 0x1f, 0x15800000, 0x6, 0x4, 0x7, 0x5b, 0x8, 0xe4d2, 0x3, 0x40]}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r6, 0x10, 0x0, 0x200) 13:32:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8040) socket(0xa, 0xb, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x2, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200080, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000002c0)={@empty, @multicast1, 0x0}, &(0x7f0000000300)=0xc) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x100, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x10, &(0x7f0000000440)={&(0x7f0000000400)=""/45, 0x2d, 0xffffffffffffffff}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x5, &(0x7f00000004c0)=@raw=[@exit, @generic={0x1f, 0x9, 0xa, 0x2c31, 0x4}, @alu={0x4, 0x1, 0x3, 0x6, 0x9, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8001}], &(0x7f0000000500)='GPL\x00', 0x401, 0xad, &(0x7f0000000540)=""/173, 0x41000, 0x5, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0xf, 0x8, 0x9}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x3, 0x8, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x6}, [@map={0x18, 0x5a789402f7c04ee9, 0x1, 0x0, r3}, @jmp={0x5, 0x1, 0x6, 0x5, 0x0, 0x50, 0xffffffffffffffff}, @exit, @ldst={0x1, 0x4, 0x1, 0x2, 0x6, 0xffffffffffffffe0, 0x1}]}, &(0x7f0000000240)='syzkaller\x00', 0x2, 0x2b, &(0x7f0000000280)=""/43, 0x41100, 0x1, [], r4, 0x4, r5, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x9, 0x1, 0x40}, 0x10, r6, r7}, 0x78) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/autofs\x00', 0x4c001, 0x0) bind$unix(r8, &(0x7f00000007c0)=@file={0x1, './file0\x00'}, 0x6e) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000840)='/dev/btrfs-control\x00', 0x604000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r9, 0xc02c5341, &(0x7f0000000880)) r10 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r10, 0xe, &(0x7f0000000900)=""/7) r11 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000940)=@name, &(0x7f0000000980)=0x10, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r11, 0x8916, &(0x7f00000009c0)={'vxcan1\x00', {0x2, 0x4e20, @multicast1}}) r12 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$sock_timeval(r12, 0x1, 0x42, &(0x7f0000000a40), &(0x7f0000000a80)=0x10) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000e00)={0xfffffbff, 0x9, 0x4, 0x2000, 0xfd9c, {0x0, 0x2710}, {0x0, 0x0, 0x1, 0x7f, 0x8, 0x8, "a31728ec"}, 0x7, 0x3, @offset=0x1, 0xff, 0x0, 0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r13) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r14, 0xc008551b, &(0x7f0000000ec0)={0x8, 0x4, [0x5]}) getuid() clock_getres(0x1, &(0x7f0000000f00)) ioctl$PPPIOCGUNIT(r8, 0x80047456, &(0x7f0000000f40)) [ 1340.274590][T20238] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1340.332186][T20238] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1340.404323][T20238] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1340.435535][T20196] IPVS: ftp: loaded support on port[0] = 21 13:32:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) setuid(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x0, 0x0, 0x38d}, 0x9c) [ 1340.583288][ T9713] tipc: TX() has been purged, node left! [ 1340.616905][ T9713] tipc: TX() has been purged, node left! [ 1340.715664][ T9713] tipc: TX() has been purged, node left! [ 1340.718685][T20256] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1340.733856][T20256] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1340.776002][T20256] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1340.856474][ T9713] tipc: TX() has been purged, node left! [ 1340.862973][ T9713] tipc: TX() has been purged, node left! [ 1340.888804][ T9713] tipc: TX() has been purged, node left! [ 1340.917850][ T9713] tipc: TX() has been purged, node left! 13:32:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$bt_sco(r2, &(0x7f0000000140)={0x1f, {0x0, 0x80, 0x7, 0x3, 0xff, 0x60}}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x2000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000e80)=[{&(0x7f0000000c40)="f20116e0bfa0b22d93b4b0038ac4410109a3d1937e36a6fed7d8ac02a9e750db8dd244e78ba2043f0394f7bf445b7be53ac62b0fd3b0603512b0c44544bde2d9e6f970b928e8202f27f60a24917e660322bfd61b617ca872144bf821dbacaba0ddac4994268b71d71ae136ec42891f35337cc38a276a9c4d313b446d523e", 0x7e}, {&(0x7f0000000800)}, {&(0x7f0000000600)="b0cc855158c67dcbc5cbb951adabe12662f561acc5c67507", 0x18}], 0x3, 0x2) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x12, 0x0) recvfrom$x25(r3, 0x0, 0x0, 0xc0010100, &(0x7f0000000300)={0x9, @remote={[], 0x2}}, 0x12) r4 = socket$inet(0x2, 0x0, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@remote, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, {0x0, 0x0, 0x9}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0xff}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x10}, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x753}}, 0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000780)={0x0, 0xfffffffffffffff9, 0x0, 0x6, @scatter={0x1, 0x0, &(0x7f0000000200)=[{&(0x7f00000003c0)=""/227, 0xe3}]}, 0x0, 0x0, 0xffff, 0x3e, 0x2, &(0x7f00000005c0)}) r5 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r7 = socket(0x10, 0x20001000000003, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)=0x0) ioctl$VIDIOC_STREAMOFF(r5, 0x40045613, &(0x7f0000000f00)=0x10000) syz_open_dev$cec(&(0x7f0000000b40)='/dev/cec#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x0, 0x0, 0x5, 0x3, 0x0, 0x9, 0x100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xda22, 0x4, @perf_bp={&(0x7f0000000a40), 0x8}, 0x200, 0x18, 0x0, 0x5, 0x7, 0x7f, 0x1f}, r8, 0x10, 0xffffffffffffffff, 0x2) write(r7, &(0x7f00000000c0)="220000001400070000e80000000003000208030001000000080002004100fff0f055", 0x22) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000001c0)={'hwsim0\x00', {0x2, 0x0, @rand_addr=0x1}}) socket(0x10, 0x20001000000003, 0x0) write$cgroup_pid(r6, &(0x7f0000000640), 0x12) 13:32:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x262002, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CAPI_NCCI_GETUNIT(r5, 0x80044327, &(0x7f0000000080)=0x5) 13:32:25 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) fcntl$dupfd(r2, 0x0, r3) fcntl$setstatus(r1, 0x4, 0x6c02) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000432000/0x2000)=nil, 0x2000, 0x0, 0x5012, r6, 0x0) socket$caif_stream(0x25, 0x1, 0x2) io_submit(r5, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fchdir(r4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r10, 0x0, r9) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000040)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGNAME(r8, 0x80404506, &(0x7f0000000580)=""/4096) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='smaps\x00') lseek(r11, 0xf989, 0x0) [ 1341.088203][ T9713] tipc: TX() has been purged, node left! 13:32:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x68}, 0x2a0}) 13:32:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x40030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14005}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) setuid(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x0, 0x0, 0x0, 0x0, 0x38d}, 0x9c) [ 1341.162305][ T27] audit: type=1804 audit(1577626345.491:178): pid=20277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir109899441/syzkaller.n1QmJf/23/bus" dev="sda1" ino=17109 res=1 13:32:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x58, 0xc00000000000000, 0x1bc) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) rt_sigpending(&(0x7f0000000000), 0x8) [ 1341.389339][T20294] IPVS: ftp: loaded support on port[0] = 21 [ 1341.430903][T20286] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1341.437597][T20286] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1341.493277][T20286] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1341.768729][T20304] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:26 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='gfs2meta\x00', 0x80000, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) [ 1341.830245][T20304] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1341.958937][T20304] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1341.985577][T31230] libceph: connect (1)[d::]:6789 error -101 [ 1341.992805][T31230] libceph: mon0 (1)[d::]:6789 connect error 13:32:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[r6, r0, 0xffffffffffffffff]}, 0x3) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r7, 0x10, 0x0, 0x200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(r9, 0xc0106403, &(0x7f0000000000)={0x5, 0x400, 0x9, 0x1}) [ 1342.155936][ T27] audit: type=1804 audit(1577626346.481:179): pid=20277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir109899441/syzkaller.n1QmJf/23/bus" dev="sda1" ino=17109 res=1 13:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x41a9e50b, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1342.412614][T20294] IPVS: ftp: loaded support on port[0] = 21 [ 1342.444268][ T27] audit: type=1804 audit(1577626346.771:180): pid=20315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir109899441/syzkaller.n1QmJf/23/bus" dev="sda1" ino=17109 res=1 13:32:26 executing program 1: r0 = getpid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000fe4c0d9bf1dd8833ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100ce4fdd45390000000000000001007d6bb7030000000000006a0a00fe0000000085000000c40928a7000a64e1282496ff4164e0502600000096ace264080000006e0879d68e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r3, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r4}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r6, 0x0, 0x9, &(0x7f0000000080)='fdinfo/3\x00', r4}, 0x30) pidfd_open(r7, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendfile(r9, r8, 0x0, 0x209) 13:32:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x140c0, 0x0) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000200)) fallocate(r3, 0x10, 0x0, 0x200) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x5, 0x4000) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000740)={0x0, 0x80000, r5}) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) ftruncate(r6, 0x1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) open_tree(r8, &(0x7f0000000280)='./file0\x00', 0x801) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3c) ptrace$cont(0x18, r11, 0x0, 0x0) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r11, 0x0, 0x0) r12 = syz_open_procfs(r11, &(0x7f0000000380)='net/raw\x00') ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000003c0)={0x1, 0x2, 0x3, r12}) r13 = socket$inet6_udp(0xa, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r10) ioctl$sock_SIOCGIFBR(r14, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$netlink_NETLINK_TX_RING(r14, 0x10e, 0x7, &(0x7f00000002c0)={0x3, 0x1, 0x0, 0x24}, 0x10) connect$unix(r9, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) [ 1342.805231][ T742] libceph: connect (1)[d::]:6789 error -101 [ 1342.815411][ T742] libceph: mon0 (1)[d::]:6789 connect error 13:32:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x81, 0x4, {0x4, 0x2, 0x8, 0x3}}) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000200)=0x80000001, &(0x7f0000000240)=0x4) fchdir(r0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f00000000c0), 0x8080fffffffe) socket$inet6_sctp(0xa, 0x10000000005, 0x84) [ 1342.848850][T20342] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1342.856015][T20342] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1342.883144][T20342] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x1e400, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000000c0)) 13:32:27 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='gfs2meta\x00', 0x80000, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) [ 1343.217144][T20357] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 1343.298723][T20342] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1343.317470][T20342] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1343.318266][T20357] FAT-fs (loop2): Filesystem has been set read-only [ 1343.347674][T20342] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1343.361716][T20357] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000020) 13:32:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6c}, 0x2a0}) 13:32:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000080)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) fallocate(r3, 0x44, 0x4, 0x6) 13:32:29 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r4, r5, 0x0, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) fcntl$setpipe(r6, 0x407, 0x101) 13:32:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x81, 0x4, {0x4, 0x2, 0x8, 0x3}}) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000200)=0x80000001, &(0x7f0000000240)=0x4) fchdir(r0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f00000000c0), 0x8080fffffffe) socket$inet6_sctp(0xa, 0x10000000005, 0x84) 13:32:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x48000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:29 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000000c0)) prctl$PR_CAPBSET_DROP(0x18, 0x25) 13:32:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x30240, 0x0) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000380)={[0xffffffff, 0x4, 0x200, 0x985, 0x6, 0x2, 0xffffb909, 0x5, 0x9, 0x4, 0x8001, 0x9, 0x2, 0x1, 0x8, 0x7ff, 0x0, 0x5, 0xa5, 0x2, 0x7, 0x2, 0x13, 0x7c, 0x5, 0x40, 0x8000, 0xffff, 0x51f1, 0x8001, 0x80, 0x1ff, 0x8, 0xeb, 0x0, 0xffff7fff, 0x81, 0x5, 0x9, 0x3, 0x8, 0x6, 0xfea3, 0x5, 0x1, 0x0, 0xc0, 0x7, 0x8000, 0x7, 0x1, 0x2, 0x1, 0x8000, 0x200, 0x7f, 0x5, 0x401, 0x2, 0xe1e, 0xeb, 0x1000, 0x20, 0x3, 0x77c, 0x5, 0x489, 0x39f, 0x6, 0xfffffffa, 0x33b9, 0x33c6, 0x3, 0x2, 0x1, 0x9, 0x6, 0x1, 0x1, 0x3, 0x7847d1a7, 0x202c, 0x800, 0x18260000, 0x9d2, 0x80000000, 0x0, 0xfffffe00, 0x2, 0x0, 0x3, 0xfffffffb, 0x1, 0x7ff, 0x2, 0x1f, 0x400000, 0x1ff, 0x4, 0x8000, 0x1, 0x6, 0x5, 0x8000, 0x401, 0x5, 0x7ff, 0xffff, 0x0, 0x5, 0x101, 0x3, 0x6, 0x8, 0x80000001, 0x5, 0xd97, 0x9, 0x7, 0x4, 0x0, 0x6, 0x1, 0x0, 0x4, 0x100, 0x7f, 0x8, 0xd84, 0x2, 0x1000, 0x1, 0x3ff, 0x5, 0x40, 0xff, 0x0, 0xa8, 0xe5, 0x0, 0x2, 0xffff, 0x7fff, 0x9, 0x4cf4, 0x8, 0xfffffff1, 0x4, 0x101, 0x6, 0x81, 0x36, 0xfffffffe, 0xd9, 0x2, 0xaf, 0x8, 0x6, 0x7fff, 0x7, 0x400, 0xcc, 0x7f, 0x1, 0x8, 0x8, 0x6, 0x4, 0x616953b3, 0xfffffffa, 0xfff, 0x2e, 0x80, 0x6, 0xac, 0xa43, 0x401, 0x6, 0x430, 0x3, 0x3f, 0x0, 0xffff73b6, 0x7f, 0x2, 0x1ff, 0x9, 0x9, 0xffffffff, 0x0, 0x4, 0xfff, 0x1, 0x8, 0x49650c96, 0x0, 0x3, 0x7, 0x400, 0x42, 0x401, 0x0, 0x8fae, 0x4, 0x80, 0x9, 0x6, 0x100, 0x8, 0x5f78, 0x443, 0x2, 0x7, 0x4, 0x4, 0x8f0a, 0x6, 0x7, 0x3, 0x3, 0x8000, 0x1ff, 0x200, 0x9, 0x6, 0x5, 0x9, 0x7, 0x1, 0x1, 0x4, 0x8, 0x5, 0x3, 0x20000000, 0x9, 0x5, 0x9, 0xfffffff9, 0x80, 0xbb, 0x9, 0x4, 0x81, 0x4, 0x6, 0x3, 0x6, 0x5, 0x4fe, 0x3, 0xfff, 0x0, 0x2, 0x3ff, 0x0, 0x7fff, 0x3, 0x4, 0xa93, 0x8000, 0xfff, 0x8000, 0x3, 0xfffffff9, 0x7fff, 0xd3f, 0x7ee, 0x7, 0x7, 0xb68, 0x400, 0x80000001, 0x764, 0x2, 0x8, 0x2c6e, 0xbc, 0x1000, 0x4, 0x7d, 0x0, 0xb, 0x4, 0x8000, 0x2, 0x5, 0x81, 0x8, 0xffffff7b, 0x1, 0x60000, 0x95d8, 0x0, 0x1, 0xfe, 0x865, 0x3, 0x400, 0xfff, 0x2, 0x7, 0x3, 0x1, 0xd9d, 0x4, 0x10001, 0x51c, 0x7fff, 0x8000, 0xffffffff, 0x7ff, 0x2, 0x5, 0x1, 0x59f, 0x7fffffff, 0x6ee, 0x2, 0x8, 0x8, 0x18000, 0xfffffffa, 0x6, 0x7, 0x3, 0x4, 0x3, 0x40, 0x8001, 0x4, 0xbe8, 0xca1, 0x1, 0x930, 0x8, 0x8, 0x0, 0x3, 0xffff8000, 0x5, 0x6, 0x4, 0x10001, 0x6, 0x889, 0x6, 0x9, 0x1, 0x9, 0x6, 0x200, 0x56, 0x8, 0xfff, 0x8, 0x0, 0x0, 0x6, 0x6, 0x608, 0x3, 0x2e26be8b, 0x1, 0x2236a33f, 0x3, 0x1, 0x80000000, 0x9, 0x5, 0x3ff, 0x7, 0x5, 0x1f, 0x2c2, 0x8, 0x3ff, 0x7, 0x3, 0x1f, 0xffffffc1, 0x0, 0x6b, 0x9, 0x2, 0xbe, 0x1, 0x28e7000, 0x32, 0x5379d0ea, 0x100, 0xffff, 0x10001, 0x81, 0x1, 0x7, 0x7fff, 0x4, 0x795, 0xef32, 0x80000001, 0x8, 0xc22, 0x10001, 0x1ff, 0x1000, 0x80000001, 0x0, 0x5, 0x10000, 0x0, 0x5, 0x5, 0x0, 0xffffffe0, 0xf2d0, 0x5, 0x8, 0x1, 0x6, 0xff, 0x3, 0x10001, 0x0, 0x6, 0x2, 0x7, 0x40, 0x4, 0x1f, 0x9, 0x3ff, 0x6, 0x8, 0x9, 0x7fffffff, 0x6, 0x7f, 0x7fff, 0x656d, 0xffffffbc, 0x8000, 0x5a6, 0x9, 0x46d0, 0x26, 0x3, 0x100, 0xfff, 0x4, 0x4b, 0xf9f, 0x7fff, 0x10000, 0xfffffffa, 0x4, 0x5, 0xffff, 0x3, 0x9, 0x6, 0x3, 0xd1d6, 0xfe, 0x5, 0x800, 0xde38, 0xffffffff, 0x2, 0xfffffb7a, 0xc25, 0x3f, 0x7, 0x4, 0x7fff, 0x1, 0x41, 0x3ff, 0x7, 0x7, 0x81, 0x4, 0x6, 0x3, 0x7f, 0x5, 0x1, 0x62ab, 0x1, 0x823, 0xffffffff, 0x8000, 0x180, 0x7, 0x6c, 0x8, 0x0, 0x3, 0x4, 0x8, 0x101, 0x7, 0x36d, 0x8000, 0x2, 0x2, 0xe56, 0xa4d, 0x74, 0x2, 0x3, 0x1f, 0x101, 0x8, 0x8, 0x8, 0x7aef, 0xe4d, 0x401, 0x400, 0x7ff, 0x100, 0x401, 0x1, 0xa0b, 0x7fff, 0x5, 0xffff0001, 0x4, 0x3, 0xf1, 0xffffffff, 0x1ff, 0x7, 0x5, 0x10000, 0x1f, 0x7f, 0x101, 0x100, 0x10000, 0x81, 0xffff806b, 0x3, 0x8, 0xa1, 0x60a, 0x1f, 0x3f, 0x6, 0x80000001, 0x2, 0x9, 0xfffffff7, 0x82f9, 0x6, 0x9, 0x40, 0x10000, 0x7ec6, 0x9, 0x0, 0x4, 0x4, 0x10000, 0x5, 0x1dbc0000, 0x5, 0x3, 0x17ebcf79, 0x8, 0x4b, 0x6, 0x1ff, 0x6, 0x0, 0x6d, 0x2, 0x8, 0x7f, 0x9, 0x3f, 0x8a9, 0x0, 0xffffffc0, 0x401, 0x8001, 0x9, 0xb6b1, 0x3, 0x4, 0x7, 0x0, 0x1ff, 0x3, 0x3, 0x3, 0xc0e, 0x5f, 0x7, 0x5, 0x2, 0x2, 0x0, 0x8, 0x3ff, 0x1f, 0x76b, 0x6, 0x8, 0x1, 0x1, 0x76, 0x7fffffff, 0x1f, 0x3, 0x20, 0x9, 0x9, 0xfe, 0x0, 0x9, 0xe52, 0xebe, 0x1f, 0x10001, 0xffffff32, 0x7, 0x2, 0xfffffffb, 0x2, 0x1000, 0xee, 0x1f, 0x3, 0x8001, 0x3f, 0x9, 0xfffffff8, 0x10001, 0xfff, 0x1ff, 0x7fffffff, 0x9, 0x2, 0x5, 0x0, 0x7ff, 0x400, 0x4, 0x480000, 0x3, 0x6, 0x5, 0x6, 0x4, 0x80000000, 0x9, 0x86f1, 0x9, 0x9, 0x20c, 0x587, 0x0, 0x3ff, 0x80000000, 0x5, 0x8, 0xd3e, 0x80000000, 0x1000, 0x75, 0x2, 0x7, 0x2, 0x6, 0x7, 0x1, 0x2, 0x40, 0x7fff, 0x7ff8, 0x8, 0x7, 0x3f, 0x80000000, 0x0, 0x0, 0xfc, 0x1, 0xc150000, 0x3, 0x401, 0x7f, 0x0, 0x7, 0x4, 0x9, 0x9, 0x5, 0x5bb5, 0x1, 0x7, 0x401, 0x6, 0x5, 0x8001, 0x7, 0x1, 0xfffffff7, 0x3, 0x6, 0x4, 0x1ff, 0x81, 0x4, 0x6, 0x200, 0x9, 0x4, 0x1ff, 0x2, 0x20, 0x0, 0x2, 0x40, 0x4283d056, 0x6, 0x77, 0x0, 0x3, 0x574a, 0x200, 0xdd, 0x3, 0x401, 0x4a7, 0x755af235, 0x6, 0x1, 0x7, 0x3, 0x401, 0x100, 0xbef, 0x9, 0x80, 0x4, 0x0, 0x6, 0x3ff, 0x2, 0x8e, 0x2, 0xff, 0x1, 0x1197, 0x8000, 0xfffffe01, 0x200, 0x6, 0xff, 0x8, 0xfda4, 0x5, 0x1389b77c, 0x1, 0x2, 0x0, 0x7, 0xaddc, 0x8, 0x8000, 0x247, 0x3, 0x9, 0x80000001, 0x80000000, 0x8, 0x1f, 0x3, 0x7, 0xfff, 0x9, 0x101, 0x7fff, 0x9, 0xffffffff, 0x5, 0x0, 0x0, 0x0, 0x2, 0x100, 0x5, 0xfffffffe, 0x7, 0x401, 0x8, 0x9, 0x0, 0x1f, 0x3, 0x1312, 0x40, 0x0, 0x0, 0x40, 0x5, 0x6, 0x0, 0x7, 0x8, 0x7ff, 0x9, 0x1, 0x81, 0x9, 0x1f, 0xfff, 0x9, 0x0, 0x1, 0x3, 0x8, 0x3f, 0x200, 0xfff, 0x1fbe, 0x7, 0x0, 0x5, 0xb266, 0x0, 0x59ea, 0x1, 0x8, 0x3, 0x80000000, 0x7fff, 0xffffff7f, 0x3, 0x9, 0xfffff9c7, 0x0, 0x8, 0x3, 0x9, 0x20, 0x400, 0x2, 0x800, 0x40, 0xfff, 0x1, 0x8, 0x800, 0x9, 0x342, 0x8, 0x1000, 0x5e60, 0x0, 0x3, 0x8, 0x3, 0x101, 0x8, 0x6, 0x1, 0xb85, 0x3d, 0x120, 0x1, 0x70, 0x80, 0x3, 0x4, 0x8c73, 0x8001, 0x7fc00000, 0x1, 0x9e, 0x9, 0x5, 0x2, 0x7ff, 0x5, 0xff, 0x1f, 0xffff8001, 0x1, 0x4, 0x7f, 0x7, 0xa99, 0x7dd5000, 0x8, 0x1000, 0xaa, 0x7ff, 0x375, 0x7ff, 0x36fd, 0x4, 0x8, 0x1, 0x3ea2, 0x3, 0xffff, 0x8, 0x7, 0xfffffffb, 0x5, 0x1, 0x56, 0x8, 0x1, 0x3, 0x2, 0x100, 0x5, 0x6, 0x5, 0x800, 0x1, 0x3, 0x80, 0x7, 0x80000001, 0x3, 0x3f, 0x5, 0x8, 0x400, 0xfffffff7, 0x2, 0x3, 0x1000, 0x6708, 0xfffffffb, 0x2, 0xff, 0x5, 0x7, 0x2, 0x20, 0x7, 0x6, 0x5, 0x2, 0x80000001, 0x100, 0x5, 0x6, 0x100, 0x9, 0x8, 0x6000, 0x1, 0x9, 0x8, 0x9, 0x6, 0x8, 0x10001, 0x5, 0xe765, 0x9, 0x4, 0x1, 0x0, 0x8, 0x3, 0x401, 0x0, 0x6d, 0x9, 0x4, 0xec, 0x5, 0x5, 0x1, 0x6, 0x3, 0x6, 0xffff3fa7, 0x6, 0xffffffff, 0x3, 0x0, 0x3, 0x8, 0x800, 0x9ff0, 0x0, 0x1ff, 0x1f40000, 0x3, 0x1, 0x7, 0x4, 0x464, 0x7, 0x2, 0x401, 0x792, 0xa289573, 0x3f, 0x1000, 0x7ff, 0x7ff, 0x8, 0xfffffffc, 0x5, 0x7ff, 0x101, 0xff, 0x80000001, 0x3, 0x9, 0x7fff, 0x800, 0xffffffc1]}) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) getpid() [ 1345.622302][T20443] IPVS: ftp: loaded support on port[0] = 21 [ 1345.642376][T20434] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201f, 0x3f000002}) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r3 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x1, 0x400000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000840)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)={0x194, r4, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xe8, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x334}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdef7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcb48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf06}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe46}]}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xba96}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd1a6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x4800}, 0x8060) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) [ 1345.670622][T20434] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1345.780182][T20434] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1345.907217][T20436] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 16) 13:32:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r4 = fcntl$dupfd(r0, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1345.954132][T20436] FAT-fs (loop2): Filesystem has been set read-only [ 1346.027617][T20436] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000020) 13:32:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) tee(0xffffffffffffffff, r0, 0x0, 0x1) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) [ 1346.188464][ T9713] tipc: TX() has been purged, node left! [ 1346.194764][ T9713] tipc: TX() has been purged, node left! [ 1346.207635][ T9713] tipc: TX() has been purged, node left! [ 1346.219153][T20465] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1346.229449][T20465] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff, 0x5, 0x41}, 0x10) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0014f9f40700090400020000000000000000000000080001", 0x1f) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x103}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) [ 1346.247647][ T9713] tipc: TX() has been purged, node left! [ 1346.268528][T20465] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4c000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1346.568321][T20474] hfsplus: unable to parse mount options [ 1346.654488][T20488] hfsplus: unable to parse mount options [ 1346.665297][T20443] IPVS: ftp: loaded support on port[0] = 21 [ 1346.920858][T20495] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1346.929567][T20495] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1346.963128][T20495] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1347.191588][T20504] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1347.202402][T20504] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1347.224548][T20504] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x74}, 0x2a0}) 13:32:31 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x98d0, 0x2}, @window={0x3, 0xd3d9, 0x6}, @sack_perm], 0x3) 13:32:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x1ff) 13:32:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') preadv(r2, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0x163) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000100)={r2}) setresuid(r3, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$bt_hci(r6, 0x0, 0x0) 13:32:31 executing program 2: ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f0000000000)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x5, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xff, 0xff, 0x8000, 0x8}, &(0x7f00000001c0)=0x98) r2 = accept(0xffffffffffffffff, &(0x7f0000000200)=@ethernet={0x0, @local}, &(0x7f0000000280)=0x80) bind$bt_hci(r2, &(0x7f00000002c0)={0x1f, 0x5}, 0x6) recvmsg(r2, &(0x7f0000000740)={&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000480)=""/46, 0x2e}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000000580)=""/26, 0x1a}, {&(0x7f00000005c0)=""/72, 0x48}], 0x6, &(0x7f00000006c0)=""/80, 0x50}, 0x11000) io_setup(0x3ff, &(0x7f0000000780)=0x0) io_cancel(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0xff9b, 0xffffffffffffffff, &(0x7f00000007c0)="47be072f97bf5c234bbc737739ab5f258dbaa3067cf2244e323554299ddf0526886fe1d34bd1d9ebd9bad930c7706ac719ac3f062427de12b6b35a72812a05e893069b", 0x43, 0x1000}, &(0x7f0000000880)) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f00000008c0)=0x800) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000900)={0x0, 0x101, 0x47, 0x7bdc}, 0x8) r4 = fsmount(0xffffffffffffffff, 0x2, 0x4) write(r4, &(0x7f0000001c80), 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001d00)={&(0x7f0000001cc0)='./file0\x00', 0x0, 0x8}, 0x10) r6 = open(&(0x7f0000001d40)='./file0\x00', 0x8a080, 0x3) r7 = gettid() fstat(0xffffffffffffffff, &(0x7f0000003100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003180)=0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) getgroups(0x5, &(0x7f0000003280)=[0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01]) pipe2$9p(&(0x7f00000032c0)={0xffffffffffffffff}, 0x5000) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003300)='/dev/vsock\x00', 0x20000, 0x0) r14 = accept$ax25(0xffffffffffffffff, &(0x7f0000003340)={{}, [@bcast, @default, @rose, @rose, @null, @rose, @null, @netrom]}, &(0x7f00000033c0)=0x48) r15 = syz_open_dev$vbi(&(0x7f0000003400)='/dev/vbi#\x00', 0x2, 0x2) r16 = openat$random(0xffffffffffffff9c, &(0x7f0000003440)='/dev/urandom\x00', 0x0, 0x0) r17 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r18 = openat$null(0xffffffffffffff9c, &(0x7f0000003480)='/dev/null\x00', 0x105180, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003500)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000034c0)='/dev/vcsa\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000003640)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6800) sendmmsg$unix(r6, &(0x7f0000003800)=[{&(0x7f0000001d80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="7e221e6013c015756e070ac5c0dad2c19fa25556801063fa32ceb56e5831bf512b699c8944e8363def6f4887f2", 0x2d}, {&(0x7f0000001e40)="68e11ebc788dcf717b6fed2b2f05eb204699", 0x12}, {&(0x7f0000001e80)="009dce4ac5a4b3995d81d34d455740980353f15a11e0f59f3ab374143bc92ea05723bc1c984b87767b7f889424aa0128b3d6958cc0780429e776d7b59822477afcbc0a3bdf411156ee1e76792b37e77f9f5e02baec9ca6224497478cbbd505ac63f808b6497807ae5e6b91a7d0d337b792ea89e267873828580e4f7d8d6df840aed06e078b048c8f83c251e04c4524dbc0fef3dbdb0cd23b2879265d7840d4e7cf7ffe6ddc7a7211e81910a3355e7a148bb9e51b0fc69530f7f3f59d68f30a9d09bb70be494444186fdb7a7d", 0xcc}, {&(0x7f0000001f80)="638c7b544cc97e6d2c18f7499330ad985d97cbfcc2fb", 0x16}], 0x4, &(0x7f0000002000)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, r5, 0xffffffffffffffff]}}], 0x20, 0x400c000}, {&(0x7f0000002040)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000030c0)=[{&(0x7f00000020c0)="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", 0x1000}], 0x1, &(0x7f0000003740)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x34, 0x1, 0x1, [r12, r5, r2, r13, r0, r4, r14, r15, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r16, r4, r17, r18]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}], 0xb8, 0x8000}], 0x2, 0x0) 13:32:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4c010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1347.536894][T25123] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1347.537793][T20514] print_req_error: 80 callbacks suppressed [ 1347.537815][T20514] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1347.545593][T20515] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1347.626251][T20523] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1347.638556][ T2502] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1347.649916][ T2502] buffer_io_error: 63 callbacks suppressed [ 1347.649930][ T2502] Buffer I/O error on dev loop3p5, logical block 33008, async page read [ 1347.664968][T20514] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1347.685033][T20526] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1347.709721][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1347.720671][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1347.729221][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1347.740120][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1347.750563][ T2502] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1347.762187][ T2502] Buffer I/O error on dev loop3p5, logical block 33022, async page read [ 1347.770915][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 13:32:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000100)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f627573082c776f726b6469723d2e2f66696c65312c75708b3b75d969723d2e2f66696c6530dced617ab29f30824d4d2114e6e0ecaf3787a73efbb62ca6420f4a8011b5ee160f08602a611609ae05b6db57a24c03f94a0b48935459220219ee03c914ee35e4b47d41dce461c81d10bdd6cfe01dce139f0bc570f07cae82adf475e7477f81580d7277dc85db59c1157e2e663e74a6aeeeec9e"]) chdir(&(0x7f0000000140)='./bus\x00') r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r1, &(0x7f0000001440)=""/177, 0x18) [ 1347.781940][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1347.798082][T20537] IPVS: ftp: loaded support on port[0] = 21 [ 1347.800052][ T2502] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 1347.812192][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1347.820460][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1347.828644][ T2502] Buffer I/O error on dev loop3p5, logical block 1, async page read [ 1347.836814][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read 13:32:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/\x00\x02\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) 13:32:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) io_submit(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x10001, 0x1, 0x9, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x3800) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') fchmodat(r8, &(0x7f0000000440)='./file1\x00', 0xc0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)) r9 = socket$inet6(0xa, 0x5, 0x86) bind$inet6(r9, &(0x7f0000000140)={0xa, 0x400004e21, 0x1000000, @rand_addr="2d4902b2087bb3b45b2de245c1654932"}, 0x3af) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_INITMSG(r11, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000180)=0x8) setsockopt$inet6_int(r9, 0x29, 0x43, &(0x7f0000000000)=0x9, 0x4) connect$inet6(r9, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write(r9, &(0x7f00000001c0)='s', 0xffcf) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = dup2(r12, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r13, 0xc08c5332, &(0x7f0000000280)={0xffffc000, 0x1000, 0x0, 'queue1\x00', 0x3}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 13:32:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x7f}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f0000000100)="b83dc58036198d9657ec388ce2d8a5181555", &(0x7f0000000140)=""/74}, 0x20) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$KIOCSOUND(r5, 0x4b2f, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x0, 0x8000}, &(0x7f00000000c0)=0x8) [ 1347.940714][T20543] overlayfs: unrecognized mount option "up‹;uÙir=./file0Üíaz²Ÿ0‚MM!æàì¯7‡§>û¶" or missing value [ 1348.018393][T20538] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 13:32:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) socket$inet(0x2, 0xa, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setgid(0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b0fd"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r7) writev(r7, &(0x7f0000000580)=[{&(0x7f0000000080)="7f4aa1b6294417a454258048b38238cb880ae1cc5d1bf25c50aab255663743db4144286008b9b8b6d0ca3ced63667a01f909a158853115d4578c3f549c6608697983bee1ee369647721a25949912d309f750704c273676a484e1199abe2ffece9a967a2857b8bfbcde04b3f50165e66e255dd4", 0x73}, {&(0x7f0000000100)="7164670a0535f7f9503369c2b99443139dd2923a6523ae445e3b37fd81a8997101606ab8bdc0d8333511c916bd2197185e83d45642078e5b62cab72601c3eaf0c38d451df4957306013368194a3ddeb8dc69f9c89c94e413299e3d558f884f3a0a918197dbb9673b2820e4ae192b4f0118f21ef1d5ef714a2620d6cd0fb71115c66048800d651e65dfce31fc89e90153083bff1cf2", 0x95}, {&(0x7f0000000000)="d041b75eb94e19c8aef31305f390746d145cc0e58f7d", 0x16}, {&(0x7f00000001c0)="a2c4986af2e5825034cdc24a389a1977c55f0a881336861132c12e0bd75c260150849544e2cf223ebce955146f34a84430c4253d8c4f1bd36613d3974686aeda22", 0x41}, {&(0x7f0000000240)="debde53acd766925830a9ce42db8434a5cf6b86f79091123e14a", 0x1a}, {&(0x7f0000000280)="509ecffec8671001ee29de3389535f0203100a99a3b0e129c11db2856619d5f0b647b5ac85afd81081e980d91849179527b3fa426209e7c12e98973438ff2d4f60c421e33d5a790a11b7958056119cfb78b9f6", 0x53}, {&(0x7f0000000380)="2f3c52ec12d5f0a205cca2fffa0f869fb1703afba02e1947b5011430efe25fad51ead7161c7fe773f0525b6e1d700a6d26132e7389b80e4e09affbdc3db2820c32e9850d2c57306acb3815373691ba3255041bd54a9a8b0dd41472c72cd0bcb5f45d60325f0155e9bdd5f4d470baee8b0c441a41ae21b850d1e45a050fbc92a195bd078a0c3db44b4d9855456df10e87e65c71f49ff461790b2acd6b42811600c07b129eca2e3dc353b5f7f430adc270ba6982", 0xb3}, {&(0x7f0000000440)="135f7967df8ff36c65d0d08a85ac0bcc69209bd11d29a4a3ac77b9d8793269d9bbdcbe59d1cfe173dc837e73a7fb12d791d706f69adaa9fca848770c1f03cf9ec9a964945965f919dc8d8de2ccca4cd993f3e32f35dddda4cbc5ef6739d395ac47f2026f8460c0d243bbb17b87f71c384678ca8a5856387d3dc1770810d9d9076fab00366f500390770ba18f2d78b06771eab80378977122c5acab6f3e14967b913afb4cd0f1f09d", 0xa8}, {&(0x7f0000000500)="39b33500999ca3fff30547b69e1be2d5cb2a70ea71161c4a055502398f20cd5a3e40a32baf74c18cd1004d1055d263e24d1cc0d92606633e609d49d5e25e22e3a6410072b25ca31bcfc2385d280366358d3e5c", 0x53}], 0x9) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r9, 0x10, 0x0, 0x200) 13:32:32 executing program 2: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x80, 0x16, 0x302, 0x3, 0x0, 0x101, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) read$usbmon(r1, &(0x7f00000001c0)=""/180, 0xb4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40200, 0x0) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f00000000c0)) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000000)=0x1) [ 1348.630084][T20579] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 1348.734956][T20577] fuse: Bad value for 'group_id' [ 1348.860285][T20585] fuse: Bad value for 'group_id' [ 1348.969097][T20537] IPVS: ftp: loaded support on port[0] = 21 13:32:33 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x7a}, 0x2a0}) 13:32:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) r2 = socket$kcm(0x29, 0x80000000000005, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, '\x03\x86\xdd'}]}, 0xfdef) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r4, 0x0) r5 = socket(0x5, 0x8000a, 0x2) sendmmsg$alg(r5, 0x0, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r6) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0x1fc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r8, 0x0) write$P9_RWALK(r8, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$audion(0x0, 0x900000000, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x1a2) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) socket$inet6(0xa, 0x2, 0x0) 13:32:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x50010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:33 executing program 1: r0 = socket(0x100000000010, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_delroute={0x30, 0x19, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1700}, [@RTA_GATEWAY={0x14, 0x5, @local}]}, 0x30}}, 0x4000000) r1 = shmget(0x3, 0x3000, 0x54001a06, &(0x7f0000006000/0x3000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000080)=""/45) 13:32:33 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0xdfa38b7898592aae, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000001840)={0x80000000, 0xa, 0x4, 0x4000, 0x400, {}, {0x4, 0x2, 0x0, 0x6, 0x3, 0x80, "81699c57"}, 0x3, 0x1, @offset, 0x1, 0x0, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r4) writev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)="8fcaf335a136a098fcc9f6e265b5f76ce8917fb60f6cb329dd1fb60a55f4f95cc243d9aaafc167790545d941a5be6767e65b5d4c22c7f1aac121bacda8bc235670e55e2402ca7a899c195414acaae7379682bde8a95402238c8fe0a43e6efbd39d9c4528c309e632fdad6d6fd0ccd96e6709017bd7b59326c959881a28f79dc549d03ab80112845b839b8d6b7de0d0ad1f221f4dc7e0b0a79bb77f1d1e76460a3df632b8681c143e1c79da537d028ce578b4dd4902ae3b4ff28547d063c461851644c4bd858864", 0xc7}, {&(0x7f0000000240)="67f758684b3f0390fe8897a89ef5b8f799fc6298e714e05d739ed7b36daa4ec2ff7f2e244dd2cc7a691cb651f515b8e1e8e984afa4d8e8d2e4d3a2e8c0151c72bc4d32c45abd16d0be2fef46e175480839deccec282c60768be8", 0x5a}], 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x8, &(0x7f0000001780)=[{&(0x7f00000002c0)="084c98af590dee56d757c35c3f251fd60d0a8c1b0ffe37583db30d682772f0bb7f3054de93b65283e01e9924d09a0ffaa2b7a4a79e7031d5f1b7d2230a0ba80b0cc38a", 0xfffffffffffffeef, 0x1}, {&(0x7f0000000340)="8ea5b3e5cb1ae6dcc45a915da824269923297a3b46df0bbd1b494203edcf93701e20879e5984886e5089492ba3c7a03cfec0f2ccab45a87b0eaa2643fee64126fb7806e0f3794e895e16013520721c1dd988ae8311c4c76de87c98d393", 0x5d, 0x8080000001}, {&(0x7f0000000400)="42ae3aec71e15ce3926a0e1d733126b61bec3d285d6240c13638c536e318926e0b", 0x21, 0x1}, {&(0x7f0000000580)="6659f859365119880a039e16c14f6a39155a4268d248a892e1978b91fbf992714881b845207ef99fdd2dabbd082fc2782fb8fa97a5b21cef65989dbaf208457d7ec73f5ec9c4b164e2dce40429fee807a6430a5d1289b74927374348adbf6b719e50343d4d38d8c16eaffd936a8d9834907dd2cc732211519ccbfa5870cd7b65bbdac77ad776dc089792034d81ff940bf7482b44b6d07c25112ff6ecea2566162d06c9dca17c11184f", 0xa9, 0x8}, {&(0x7f0000000440)="812784fcb3de4255e87d7af21c6c4d4b277750bc731a42a711783ff8d2e5bbec57928ac0076c4763fb53fa79a340df64103afd1848bebcfa2e580ae8", 0x3c, 0x3}, {&(0x7f0000000640)="8f4564d395c690a660ef2639ea150f399254e16091db0fa470861d969a6d23df80bee2bb74ef015b07620152fa389ef1ea07c801a02bddf923780fd9efe4e6596bb3caccbc9f5d5cd00bdafc3ce24b6f4b8cba6bfdd84e1c4c5ecaf017625169271fdfe02320300fa85fe714b8c5d633513f88d1bf8306033071da1fe2fd868da7238ed8af2c", 0x86, 0x9}, {&(0x7f0000000700)="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", 0x1000, 0x3}, {&(0x7f0000001700)="0ed057d83886038ca3553fc8f6170d5495a5b31519b8b93ac26425c6930c5e3add3acceecdb88a1c8f73294f44f4615d310dc406638b28405b97a212188b1e5aa66ee5151218cd19b6824229392c043bb99973b8d98c321837a6f7e576deacfabc033741b66397bba1173a8f0a", 0x6d, 0x2}], 0x0, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001, 0x100010, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x3, 0x0, 0x3, 0x2, 0x7f, 0x5}, &(0x7f0000000480)=0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) 13:32:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) [ 1349.503158][T20616] IPVS: ftp: loaded support on port[0] = 21 [ 1349.527669][T20617] device nr0 entered promiscuous mode [ 1349.548832][T20618] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd010000800000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x873) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) fcntl$addseals(r4, 0x409, 0x1) fallocate(r3, 0x10, 0x0, 0x200) r5 = accept4$nfc_llcp(r2, &(0x7f0000000080), &(0x7f0000000000)=0x60, 0x80800) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x8001, 0x1, 0x9f, 0x6}, {0x1, 0x3, 0x5, 0x8}, {0x4, 0x40, 0x6, 0x7fffffff}, {0x0, 0x1, 0x7f, 0x6cc4}]}, 0x10) [ 1349.581471][T20618] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1349.680123][T20618] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1350.000575][T20638] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 1350.006048][T20638] loop1: partition table partially beyond EOD, truncated [ 1350.033784][T20638] loop1: p1 start 1 is beyond EOD, truncated [ 1350.067895][T20638] loop1: p2 start 128 is beyond EOD, truncated [ 1350.075355][T20638] loop1: p3 size 2 extends beyond EOD, truncated [ 1350.084398][T20638] loop1: p4 size 32768 extends beyond EOD, truncated [ 1350.091795][T20638] loop1: p5 start 128 is beyond EOD, truncated [ 1350.098132][T20638] loop1: p6 size 32768 extends beyond EOD, truncated 13:32:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x50030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1350.233600][T20645] device nr0 entered promiscuous mode [ 1350.301394][T20616] IPVS: ftp: loaded support on port[0] = 21 13:32:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) clone3(&(0x7f0000000380)={0x8000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), {0x3b}, &(0x7f0000000100)=""/153, 0x99, &(0x7f00000001c0)=""/236, &(0x7f00000002c0)=[r2, r3, r4], 0x3}, 0x50) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r6, 0x10, 0x0, 0x200) 13:32:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4041c0, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$DRM_IOCTL_LOCK(r5, 0x4008642a, &(0x7f0000000000)={0x0, 0x1}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r1, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc0a}], 0x1, 0x0) [ 1350.578801][T20660] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000001680)=ANY=[@ANYBLOB="2a0000000000000003300100000000007a00000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/122], @ANYBLOB="00000000000000000000000000000000c800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/200], @ANYBLOB="000000000000000000d00000000000007c00000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/124], @ANYBLOB="00000000000000000040000000000000ce00000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB="00000000000000000400000000000000c600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="000000000000000000f00000000000000010000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="00000000000000000060000000000000af00000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/175], @ANYBLOB="000000000000000000d0000000000000ce00000000000000", @ANYPTR=&(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) fallocate(r3, 0x10, 0x0, 0x200) [ 1350.604178][T20660] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1350.626033][T20660] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x300}, 0x2a0}) 13:32:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0xc16c824d4fee9717) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000000c0)) fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000080)='ip6erspan0\x00'}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000100)={[], 0x5, 0x0, 0x80, 0xffffffff, 0x6, r8}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) 13:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r5, 0x54, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ff}, @in6={0xa, 0x4e22, 0xfffffe01, @mcast1, 0x2}, @in6={0xa, 0x4e20, 0x657e, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd7e}]}, &(0x7f0000000180)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r9, 0x10, 0x0, 0x200) 13:32:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000001680)=ANY=[@ANYBLOB="2a0000000000000003300100000000007a00000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/122], @ANYBLOB="00000000000000000000000000000000c800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/200], @ANYBLOB="000000000000000000d00000000000007c00000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/124], @ANYBLOB="00000000000000000040000000000000ce00000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB="00000000000000000400000000000000c600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="000000000000000000f00000000000000010000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="00000000000000000060000000000000af00000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/175], @ANYBLOB="000000000000000000d0000000000000ce00000000000000", @ANYPTR=&(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) fallocate(r3, 0x10, 0x0, 0x200) 13:32:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x10) [ 1350.918208][ T9713] tipc: TX() has been purged, node left! [ 1351.031119][ T9713] tipc: TX() has been purged, node left! [ 1351.037005][ T9713] tipc: TX() has been purged, node left! 13:32:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x52000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/543], 0x20) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_eee={0x45, 0xafd, 0x9, 0x4, 0x4, 0x400, 0xfff, 0x0, [0x0, 0xffff]}}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_triestat\x00') sched_setattr(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 13:32:35 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x2000000000000001}, 0x20, 0x0, 0xfffffff9, 0x3, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') unshare(0x40000000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x8) r2 = dup(0xffffffffffffffff) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000200)={0x1f, 0xa, 0x3}, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000000)={0x9, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}}, 0x88) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000180)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) [ 1351.156590][T20688] IPVS: ftp: loaded support on port[0] = 21 13:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0xa10000, 0x1f, 0x88df, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x3d03b5, 0x4, [], @value64=0x2}}) write$P9_RWALK(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="3d0000006f020003ea7002000000000000000001000030000000000100000000000000820400000000000000000000007d000080e1066ec7e8dbef000000d50000000000"], 0x3d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r4, 0x5502) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x100, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x37, 0x6, 0x80, "e80c8bb30415bb2d646ce7ca40edc901", "62b4563348a49d2260134108437d1462f8aec8bca9280344be67fdf6fafa2120856c"}, 0x37, 0x2) getsockname$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) sendmsg$nl_route(r8, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8400}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)=@setlink={0x160, 0x13, 0x200, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, 0x20000, 0x140}, [@IFLA_VF_PORTS={0x140, 0x18, [{0x50, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b28ba55815ea523fb361f18121e224a6"}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "e236aeb0e11fcebe4a378714a8469ff1"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7b5c031d9a3880ed47e9f74234816b36"}]}, {0x90, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "fb10efe27cf6bc3d473a786eb3e72c0b"}, @IFLA_PORT_PROFILE={0x10, 0x2, '/dev/nullb0\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'system\x00'}, @IFLA_PORT_PROFILE={0x1c, 0x2, 'selinuxwlan0em1vmnet0\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6c8b85a4d41fc9d0c23c43a7d99712a5"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a2ab9a4f68c451b034f84721e3bedacf"}]}, {0x3c, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x40000000}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a6e0cda16656daa9e8c0515a20e6bbed"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3c62179c5b6cad578eeac123ca9be881"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x7f}]}, {0x20, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f53f1b8c1eeb9971279eba478ed4b6de"}, @IFLA_PORT_PROFILE={0x8, 0x2, '[,!\x00'}]}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000040) r10 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$KVM_HYPERV_EVENTFD(r6, 0x4018aebd, &(0x7f0000000100)={0x1, r10}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r5, &(0x7f0000000300)="4a68e2ea072192cba320dba9ea3e74cf37f1ddd200de96b2cfe9a656ac9f8aca5268cff2133b3eeacd5da63830d394ea", 0x30, 0x80) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000000)) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x1, 0x36caf442e306e00e) fallocate(r14, 0x10, 0x0, 0x200) [ 1351.229225][ T9713] tipc: TX() has been purged, node left! 13:32:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000001680)=ANY=[@ANYBLOB="2a0000000000000003300100000000007a00000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/122], @ANYBLOB="00000000000000000000000000000000c800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/200], @ANYBLOB="000000000000000000d00000000000007c00000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/124], @ANYBLOB="00000000000000000040000000000000ce00000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB="00000000000000000400000000000000c600000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="000000000000000000f00000000000000010000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="00000000000000000060000000000000af00000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/175], @ANYBLOB="000000000000000000d0000000000000ce00000000000000", @ANYPTR=&(0x7f0000001580)=ANY=[@ANYBLOB='\x00'/206], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) fallocate(r3, 0x10, 0x0, 0x200) [ 1351.451401][T20698] IPVS: ftp: loaded support on port[0] = 21 [ 1351.479035][T20702] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1351.492487][T20702] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x108, 0x6, 0x7f, 0x1db, 0x7a, 0x2, 0x11e, 0x3}, "3b74819775f22e2b3841ebf14e0a895c60714f262e47eb167b234de2a500500f0e32f593c88f892016d48286ea891abc2389e4f72c71", [[], [], [], [], [], [], [], []]}, 0x856) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1351.568513][T20702] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}]) io_destroy(r2) r3 = dup3(r0, r1, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1352.573518][T20688] IPVS: ftp: loaded support on port[0] = 21 13:32:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x500}, 0x2a0}) 13:32:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x55000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:38 executing program 0: socketpair$unix(0x1, 0x50763ad27cdb5ef5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x105040, 0x0) 13:32:38 executing program 5: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5b) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="2302eb3f9d0992d8935515664a0138c3d5149a28024a3877cbf0ec47864990045111e2b2dd57c1973b3ffdba00e7f9e69e807978b5e1d586394939ad631f063e65532ef1844a63a60883183bead4429f62c31c995303249c6af5280a41b11c8d6a8cf19c32688283603c9037da4719a1456755605c96687376c482ea6a52225667219266458719ed812e65e3d61056c476c6a66adf2173b65344bf80610e90f34c3387282355fedd59c80cb630324d7e6aafd65612906d387f0e934894ed6302dfc12d94f2383617ca9aea66e38fe918d56df66cefd6f0318a83f301c6b82491bcf8e54d2f8a6addcd296ce65b9c0d709aecf3d33f757ef90438ddd670afd8130716239551120fc19147653b9182598fdbbc20e4642c370de31541ece84b994dcfa996006f9b53435f493a255e4d4d3d418915528e14ccf430f70374d5bc6aaf37e737f9ab73f05742875f2e4cda5d9aa1722d75f3cb6b218f3bdb4740d0e3534981daa171a123c87c3ab465732a3b4b25869edcace794f76843f9193a1a4ba13471abd47e737b2c500a8c14d1e74d62aa1b25af6da7a74b344e819a6ba6d24308b0723fa3a5"], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) ptrace$peek(0x3, r5, &(0x7f0000000100)) close(r1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x4f5, 0x2, 0x4173, 0x10000, 0x7}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RATTACH(r4, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x16, 0x4, 0x3}}, 0x14) write$P9_ROPEN(r1, &(0x7f00000001c0)={0x18, 0x71, 0x1, {{0xa, 0x4, 0x3}, 0xf7f}}, 0x330) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r7, 0x4008af00, &(0x7f0000000240)=0x80000000) 13:32:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x4e23, @multicast1}, {0x306, @random="f5cb1df70768"}, 0x4, {0x2, 0x4e22, @broadcast}, 'bond0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0xa8ee0027f293df57}]]}}}]}, 0x38}}, 0x0) 13:32:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7faa67be5a393d78, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x605, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r3, 0xc074510c, &(0x7f0000000100)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={r3, 0x10, 0x0, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f00000003c0)=0x1, 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f000003bfff), 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file1\x00', &(0x7f00000000c0)='./file0\x00') r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x1d5000, 0x0) sendto$rose(r4, &(0x7f0000000540)="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", 0x1aa, 0x1c0c0, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0xffffffffffffff27) mount(0x0, &(0x7f00000002c0)='./file0/../file0/file0\x00', &(0x7f0000000340)='sysfs\x00', 0x0, 0x0) [ 1354.403856][T20786] netlink: 'syz-executor.1': attribute type 15 has an invalid length. [ 1354.448411][ T9713] tipc: TX() has been purged, node left! [ 1354.457530][T20778] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1354.466280][T20778] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1354.478338][T20778] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1354.488641][T20781] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1354.494755][T20792] IPVS: ftp: loaded support on port[0] = 21 13:32:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x15, 0x12d, &(0x7f0000000380)="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"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1354.548356][ T9713] tipc: TX() has been purged, node left! [ 1354.569011][ T9713] tipc: TX() has been purged, node left! [ 1354.638530][T20781] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 13:32:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00008a7fe4)={0x5, 0x1, 0x6, 0x28}, 0x1b) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00002ff000)={r0, 0x6d, &(0x7f00007dc000)}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x48000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r3, 0x42b}, 0x40}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xe35465e742075c1a}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) [ 1354.813590][T20781] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 13:32:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x58030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1354.898444][T20781] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 13:32:39 executing program 5: r0 = gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5b) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="2302eb3f9d0992d8935515664a0138c3d5149a28024a3877cbf0ec47864990045111e2b2dd57c1973b3ffdba00e7f9e69e807978b5e1d586394939ad631f063e65532ef1844a63a60883183bead4429f62c31c995303249c6af5280a41b11c8d6a8cf19c32688283603c9037da4719a1456755605c96687376c482ea6a52225667219266458719ed812e65e3d61056c476c6a66adf2173b65344bf80610e90f34c3387282355fedd59c80cb630324d7e6aafd65612906d387f0e934894ed6302dfc12d94f2383617ca9aea66e38fe918d56df66cefd6f0318a83f301c6b82491bcf8e54d2f8a6addcd296ce65b9c0d709aecf3d33f757ef90438ddd670afd8130716239551120fc19147653b9182598fdbbc20e4642c370de31541ece84b994dcfa996006f9b53435f493a255e4d4d3d418915528e14ccf430f70374d5bc6aaf37e737f9ab73f05742875f2e4cda5d9aa1722d75f3cb6b218f3bdb4740d0e3534981daa171a123c87c3ab465732a3b4b25869edcace794f76843f9193a1a4ba13471abd47e737b2c500a8c14d1e74d62aa1b25af6da7a74b344e819a6ba6d24308b0723fa3a5"], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) ptrace$peek(0x3, r5, &(0x7f0000000100)) close(r1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x4f5, 0x2, 0x4173, 0x10000, 0x7}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RATTACH(r4, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x16, 0x4, 0x3}}, 0x14) write$P9_ROPEN(r1, &(0x7f00000001c0)={0x18, 0x71, 0x1, {{0xa, 0x4, 0x3}, 0xf7f}}, 0x330) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r7, 0x4008af00, &(0x7f0000000240)=0x80000000) 13:32:39 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x201080, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000003080)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)=@v2={0x2, @aes128, 0x1, [], "0f01a263900eaea6375700"}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = open(0x0, 0x8040, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x40}, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$setlease(r3, 0x10, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r7 = eventfd2(0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) r8 = dup(r7) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8a3a7c2a792e704b, 0x0) write$P9_RLERRORu(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000000000070616e34077c722e0ba0897634c4502abe4600000000a5a2cecbb344242b93144798254f0e0052c2eb15251633a203604752e10b2c40a4d53900000000000065cabdc936dd41cb894dc790a567294da585f57fb492c06faa166f0842d41263cfebaaee5256325a5d5e768b5c39a4a45d3fd68f9c11293df84cb9f5b63e1f869254e70004dbe28699647a33dd3912094b300300c6dbac786bae8c960ab52b07e686302052cb79f3dc2b0ec916692ef4a6c921cb"], 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r8, 0xffffffffffffffff, &(0x7f0000000080), 0x2008000fffffffe) r10 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r10, 0x0, 0x40000000, 0x10000101) 13:32:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) [ 1355.408903][T20832] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1355.462747][T20832] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1355.507596][ T27] audit: type=1804 audit(1577626359.831:181): pid=20844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir514414618/syzkaller.WAbYhB/184/bus" dev="sda1" ino=17237 res=1 [ 1355.542713][T20832] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1355.587099][ T27] audit: type=1804 audit(1577626359.881:182): pid=20846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir514414618/syzkaller.WAbYhB/184/bus" dev="sda1" ino=17237 res=1 [ 1355.655390][ T27] audit: type=1800 audit(1577626359.941:183): pid=20836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17237 res=0 [ 1355.726291][ T27] audit: type=1800 audit(1577626359.941:184): pid=20844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17237 res=0 [ 1355.747958][T20792] IPVS: ftp: loaded support on port[0] = 21 [ 1355.838354][ T27] audit: type=1800 audit(1577626359.941:185): pid=20846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17237 res=0 13:32:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x600}, 0x2a0}) 13:32:40 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) getitimer(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x400000000120}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/212, 0xd4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) setresgid(0x0, 0x0, r0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/udmabuf\x00', 0x2) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0x4832, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40, 0x0) 13:32:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) r8 = socket$unix(0x1, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000300)={'veth0_to_hsr\x00', &(0x7f00000002c0)=@ethtool_link_settings={0x0, 0x10001, 0x5, 0x0, 0x6f, 0x40, 0x3f, 0x80, 0x7a, 0x40, [0x5, 0x4, 0x400, 0x7f, 0xff, 0xfff, 0x2, 0x7af], [0x1, 0xfffffff7, 0x1, 0xfffffffa]}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r7, 0xc0585611, &(0x7f0000000080)={0x9, 0x27adf658edc245ac, 0x4, 0x4008800, 0x6, {r9, r10/1000+30000}, {0x4, 0xc, 0x3, 0x5, 0x3, 0x1, "ed206404"}, 0x20000000, 0x2, @offset=0x1de, 0xfffffff8, 0x0, r2}) setxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x121000, 0x0) ioctl$KDGKBTYPE(r12, 0x4b33, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_NODELAY(r11, 0x84, 0x3, &(0x7f0000000100)=0x400, 0x4) fallocate(r3, 0x10, 0x0, 0x200) 13:32:40 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x201080, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000003080)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)=@v2={0x2, @aes128, 0x1, [], "0f01a263900eaea6375700"}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = open(0x0, 0x8040, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x40}, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$setlease(r3, 0x10, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r7 = eventfd2(0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) r8 = dup(r7) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8a3a7c2a792e704b, 0x0) write$P9_RLERRORu(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000000000070616e34077c722e0ba0897634c4502abe4600000000a5a2cecbb344242b93144798254f0e0052c2eb15251633a203604752e10b2c40a4d53900000000000065cabdc936dd41cb894dc790a567294da585f57fb492c06faa166f0842d41263cfebaaee5256325a5d5e768b5c39a4a45d3fd68f9c11293df84cb9f5b63e1f869254e70004dbe28699647a33dd3912094b300300c6dbac786bae8c960ab52b07e686302052cb79f3dc2b0ec916692ef4a6c921cb"], 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r8, 0xffffffffffffffff, &(0x7f0000000080), 0x2008000fffffffe) r10 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r10, 0x0, 0x40000000, 0x10000101) 13:32:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5a000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:40 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x201080, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000003080)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)=@v2={0x2, @aes128, 0x1, [], "0f01a263900eaea6375700"}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = open(0x0, 0x8040, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x40}, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$setlease(r3, 0x10, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r7 = eventfd2(0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) r8 = dup(r7) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8a3a7c2a792e704b, 0x0) write$P9_RLERRORu(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000000000070616e34077c722e0ba0897634c4502abe4600000000a5a2cecbb344242b93144798254f0e0052c2eb15251633a203604752e10b2c40a4d53900000000000065cabdc936dd41cb894dc790a567294da585f57fb492c06faa166f0842d41263cfebaaee5256325a5d5e768b5c39a4a45d3fd68f9c11293df84cb9f5b63e1f869254e70004dbe28699647a33dd3912094b300300c6dbac786bae8c960ab52b07e686302052cb79f3dc2b0ec916692ef4a6c921cb"], 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r8, 0xffffffffffffffff, &(0x7f0000000080), 0x2008000fffffffe) r10 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r10, 0x0, 0x40000000, 0x10000101) 13:32:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x0, 0x400}, {0x80000006}]}, 0x10) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x6197c3) openat$cgroup_type(r5, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) dup(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x30005, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) [ 1356.660691][T20876] IPVS: ftp: loaded support on port[0] = 21 [ 1356.728715][T20860] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1356.758678][T20860] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1356.768758][T20860] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:41 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x500}, 0x2a0}) 13:32:41 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x0, 0x2400) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x201080, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000003080)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000002c0)=@v2={0x2, @aes128, 0x1, [], "0f01a263900eaea6375700"}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = open(0x0, 0x8040, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x40}, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$setlease(r3, 0x10, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r7 = eventfd2(0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x8010, 0xffffffffffffffff, 0x8000000) r8 = dup(r7) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8a3a7c2a792e704b, 0x0) write$P9_RLERRORu(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000000000070616e34077c722e0ba0897634c4502abe4600000000a5a2cecbb344242b93144798254f0e0052c2eb15251633a203604752e10b2c40a4d53900000000000065cabdc936dd41cb894dc790a567294da585f57fb492c06faa166f0842d41263cfebaaee5256325a5d5e768b5c39a4a45d3fd68f9c11293df84cb9f5b63e1f869254e70004dbe28699647a33dd3912094b300300c6dbac786bae8c960ab52b07e686302052cb79f3dc2b0ec916692ef4a6c921cb"], 0x18) write$selinux_attr(0xffffffffffffffff, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r8, 0xffffffffffffffff, &(0x7f0000000080), 0x2008000fffffffe) r10 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r10, 0x0, 0x40000000, 0x10000101) [ 1357.058231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1357.064500][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1357.097863][T20896] IPVS: ftp: loaded support on port[0] = 21 [ 1357.458204][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1357.464030][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1357.545100][T20876] IPVS: ftp: loaded support on port[0] = 21 [ 1357.548179][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1357.556829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1358.098313][ T9713] tipc: TX() has been purged, node left! 13:32:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7000000, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d200100034000080", 0x14}], 0x1}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2000, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "c694fb28ff98a2a7", "565b354f94bf78b9a73de54d6246ba04", "13bc2a8b", "641574c4c2b282a9"}, 0x28) set_robust_list(&(0x7f0000000140)={&(0x7f0000000080)={&(0x7f0000000000)}, 0x80000001, &(0x7f0000000180)={&(0x7f00000001c0)}}, 0x18) 13:32:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5c030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:42 executing program 1: r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x8) ptrace$setregs(0xf, r0, 0x180, &(0x7f0000000280)="cf7b39d7fde62f691bec5f861f2aa0d8e0371ba376cde6ffdd17453992bd55e2f7c8593e1585d7b99169949b672bd569c56613cf90cb300a6c0bcead3aa0a5dc7b9261ba72ca8dc04dede837bfb2c4c0df959066246aa5e93082") ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) r2 = socket(0x10, 0x80002, 0x0) sched_getattr(r0, &(0x7f0000000080)={0x38}, 0x38, 0x0) close(r2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r2, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x492492492492805, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x8, 0x5, 0x4, 0x21000, 0x0, {}, {0x0, 0x9, 0x4, 0x8, 0x3, 0x7, "82d6610d"}, 0x1, 0x3, @offset=0x6, 0xe523, 0x0, r5}) getsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f0000000180), 0x2) r7 = socket$inet(0x2, 0x1, 0x7) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000440)={0x0, 0xffd9, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r11}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x40, "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", 0x4, 0x7, 0x6, 0x49, 0x3, 0x4, 0x9}, r11}}, 0x128) write$binfmt_misc(r7, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a3147125e55baacfc147d22747ed0f17f8baeffeae3fa8194a83e6428b7cc2e818e42c87193f185cf0ce789e1e55c20c64e740313855f28a2b8b2e2e5e25a8ab7f721fe4e89c002d9b79e7027fdec745a8f8affd38006f9fe617a0a1aa4460770ae020a8c015f4454d1ac0cd308f9fb2158060aa7a58aa85fe1a0693c7fde81e4bb8cab9c631418375a51a14109dbac6a7fc10029df52475b9eb1cf3fbfbcfc878b583c81b488514f0d4e8f6ae3cafee56889fd9716e494c1c90a496c5db75d6a0a67ef2e7831ecb9e4205223b2750c02ff0b20e07191f504ffd6795191385abb2f76"], 0x8d) syz_open_dev$video(&(0x7f0000001800)='/dev/video#\x00', 0x0, 0x0) 13:32:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='K\x00\xdcX\xcc*\x00\x00\x80\x00\x00\x80', 0x0, 0x0) fallocate(r3, 0x10, 0x0, 0x200) 13:32:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x700}, 0x2a0}) 13:32:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x34022, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) getresuid(&(0x7f0000000300)=0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1b1) setresuid(0xee00, r3, r5) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x120080, &(0x7f00000003c0)={'trans=tcp,', {'port'}, 0x2c, {[{@aname={'aname', 0x3d, '{{\x0f%.)]#'}}], [{@subj_role={'subj_role', 0x3d, '/dev/md0\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@dont_appraise='dont_appraise'}, {@hash='hash'}, {@uid_gt={'uid>', r1}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x6}, 0xfffffffffffffe7f) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x5bd, 0x0) unshare(0x2000600) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xa}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x154}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9a, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$sock_SIOCGIFBR(r12, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5f4e, @remote, 0xf4}, {0xa, 0x4e21, 0x8001, @local, 0x4}, r13, 0x2}}, 0x48) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x10f280) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) r14 = socket$inet(0x2, 0x0, 0x0) bind$inet(r14, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 1358.255103][T20929] IPVS: ftp: loaded support on port[0] = 21 13:32:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000080)) [ 1358.298725][ T9713] tipc: TX() has been purged, node left! [ 1358.326906][T20926] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1358.386973][T20926] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1358.458201][ T9713] tipc: TX() has been purged, node left! [ 1358.497549][T20926] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:42 executing program 1: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)={0x2, 0x8, [0x4, 0x9]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/135, &(0x7f0000000540)=0x87) r1 = openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x101000, 0x2) perf_event_open(0x0, 0x0, 0xb, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000600)={0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r7, 0x42b}, 0x40}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x68, r7, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0xc3, @media='ib\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x80004) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x4}, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r9, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {0x8, 0x1}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setregid(0x0, 0x0) 13:32:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x8, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x5, 0x8000a, 0x2) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffecd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_open_dev$audion(0x0, 0x100000000, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x1a2) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) close(r6) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r8 = getpid() write$cgroup_pid(r7, &(0x7f00000036c0), 0x12) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r10 = open(&(0x7f0000001900)='./bus/file0\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800)=0x0, &(0x7f0000001840), &(0x7f0000001880)) getgid() r12 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r12, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r12, 0x4028af11, &(0x7f0000000040)) r13 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r14 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r14, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r14, 0x4028af11, &(0x7f0000000040)) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r15, 0x4028af11, &(0x7f0000000040)) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r16, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r16, 0x4028af11, &(0x7f0000000040)) r17 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r17, 0xaf01, 0x0) r18 = getpid() getpgid(r18) r19 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r19, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r19, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r19, r20) r21 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r21, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r21, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) r23 = dup2(r22, r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) r24 = socket$inet_udplite(0x2, 0x2, 0x88) r25 = socket$inet6_udp(0xa, 0x2, 0x0) r26 = fcntl$dupfd(r25, 0x0, r24) ioctl$sock_SIOCGIFBR(r26, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r26, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r27 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r27, 0x29, 0x22, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xfffffffffffffec8) r28 = getegid() r29 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r30 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r30, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r30, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r31 = getpid() setuid(0x0) r32 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r32, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r32, 0x4028af11, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003140)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000004c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, {&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000580)="662e72720f2a216d54aa17e89c0d449032e652373ac558b7367ab3499e1527e088ccfe6e9e9da1cb7ef6af600fcc160d65b8cb23fcb40c603f34c8deab3dcea55f929ea931bcd0b1261ea7e8dca5c8efc159cd143b744301ee123b95d1efdcfab1beb4d31d7eeedb9306d3fcb6fe", 0x6e}, {&(0x7f0000000600)="9821d0f458fec4b2b88880057c6cbf1f75883f3d67c5ca23b788c472d59e9826fcb02b3cc96e881e4bb6c2f7a64506eda4f7d440b87ba40403a85446d4e222aad74f9bfc9ee12ef570fd6254f984", 0x4e}, {&(0x7f0000000680)="c46149b5297fb10dffd96c4eee0187494ca67ca162023b135bc00224e8d60ebcd759fc101a0ba94f8e402d80c13cf258cbea214f51f00ccba604c974aeea520ecfe31fd452d66d034094185fbb073e45edcb5d17b09c09227c2372975759d2941aec9a9206c2dc9a1863a19b2baaa607d6a985f3ba5f1819674008f07eaffcc4ed7ce6e828edb5b289344bb9081ed9516f5516aa8aaa1fa252f2a14e0a2ed71cb8abc7e16a74c3ff690679d9fd549b739e386dd7009aa94bdc91f36a1cb59c7c3af00312692c9a4c90e813e0c933ac4c57879a1558e9d9a0e024c504b6856358383c4f5a69e48834224b0cc85f873f73ea7cd81428c0a3331c5e5d4f2d8bf1fd71348856fae8edfcf5384d421dd3c9e358bd79aab9df40ff394ff2de80d74d21de630ee56667e018b7d742da141b9ded629a48d919af93013c48e46fee5ac01318bf29d7d61516865bb0ec682b19faea18954634d2bbe4839e443036b1a6746f4ba6a786236e6a950aa1fe49d7f7b4cc0272a55b282ec016bb53581a5b0956d5e8da6e49c2044c5bdcdb3b2ba6671f69837cb539175b5830d8a990ce286f4c4cc37e803817de55378beeffe6df3c142a53f3701f98a1ee7749081ba1ba85219ae13dd60fa37f9058abec5d0977826e679f37a41072a961622a3b26e18529c54af688446ac67e078089bcca8ef378de306d74b1925b58f7c4caf43ae9c31145f44707fbc6efbbc77630d35ddeb07b2312cd668c871bada1757dfab5ba023d48512295253e75dd96c9c3ab259076a6d4fe4d1b2d7d6e85b396dbaf7d88e002bf95c1a352c47d1db33c56831dc792993110ae145d0b06cb8614e8afa9713261aebf4c614b6fb384c9e35c0a931f3838efc015c7470a895f82c5560dc6e620e5b48c26fe83bf66d27d4e57e9d41a574d6121c00a2ac039cfcff25fa64fe916f875ee4ca2500810855e99c5f1084bd666b43918219630d42100d25afd85573fb1d12f16ee8577e2753b07daeba4474b608df7446730916fbb98f899b3dcdcb973465be48620cdfe285beb9675f42eff5e7b34a00d33ce15e62159722a0ad5bccb9497dc34551b061f5760cb43cd373d5f85e32db4defb619906a407233d7a944df75e03d179f6b4b5f9315e90da7eedae89a0d9bcab7d284e7d77ee88afdc15daff0c3a9c759761f7bad6e1e777dd0f2075aa1299b87a852050cf9ab4d24a528396a344376b58f3f3c87b4d35f2c744fb44077cc50c054ef48302334fe914f78659cd2424adae7169773a9d98e7db02bdd217266ed79c6ffad4ba973b59c37418617ae0eae100d550552aa34c0e7a0211e38e8492d723c3f408fddef627b9f14ad5ffe0bfa8b99f3eb70b7358475d4ef47dd4a2bc49aea5a38bf75b3306ff50a23676d2b3b0f395bb1775d3d4df8343d8dccad89abf37285758339427441c9d4caa3fb220454bad6a1dac487210e912d1f5e88b4d54eebcf597a169e7e588bd5ff9672003c4817bf1f2b190652db4fc02b59796a8e1eb9f1518236c84715fa8b3f880281e2772fb30ce0634b817a354f40a6d80eb2fd1ef59bb84ca1bd03aee5415bcb10d60a8364c9680a3f79383c57696630ad1be87059469457503eff4048d4d669da20481e2e5be46ae59df5fbbcc84a7e851a11b33250053e91a21c8ddc25394ba793355b922362b3db503eb5ca628108e3ef5e7cc5b653ed94cbd41dbb1d030efd0028aa78cd86508711560f1e00aebc728ca311822040d183a3f67420280a4d2257cb08123f1e3e12f4d5d4db2c3f780fc73eac364ae771b23bef57cb9c7286c29a2cfbd87f01e249c731a825286c3604851196cad3c78a9cdc9509be4010cd611c43663f8fd718c0d2e30e84a563ece5195333d14ea8c656c41e627435e991eb675df14fa01ae9961b371be23e7988d5bec3d581c8941313f8ed46ee88ce6a1d60736f147ba87c898530e99743842719008c1413df09ea4e07127d1bdd5993483c7733dfec6c7d54f82dda28e2d2723481f2dd05f5daccf5d35f539bad8be445ee90312eefbe13a61f730e9536c652d72f4b8760af2d1df10ff556ef24a6c47fa96e8db94d6b373cc14013d20b94df6fcd5517f2a8f0bb4f1850de64bae2f0f74d73b9b905da1a6001541251419a712aac1ebab55dd891f3af2c276ae2ca4e162fd483b188f51c32a9dc1065f474cbb434d66c4c584cf144c566465585167820802f15823b9b0d1f02b184419b8a3c820c069d9eff058a4920c7fd21fc028f17e452aee548abe6044f085bf040d3634ddee9d376d2e95d6dd7e51bd69629ab9d2a69aa775c8d1b34229a0a663d11733f5c5c42c88e8236ead20106d93db5845351184b334ef8103d1956e2a86556b41166f66895521324b47af2a909b0e55454bba1b5d9e669165e6008aea442759aa732fd85cce72c5fd0b9ce684fe101d728e1a2a050d8b95c97294c5cc0456553d06829b7d44da4bb663c0188f8a8656effb7eb7373e713d65935040d96af39681b18f0b609ce346bcc7c9f30378a8d42046007b0ee1801b3e22254e699ebebbe2d64ac9a4a056689e806b7972d690371dbecef5f39c2b8c402aac48456f43188f4d3a1a135d30d2ea10586d1bc5bd8ac844d1418dcbd2d187f2f05a31961641256469088f9dcba6e11e3a6c3e862c7a60d7adac25288b523149f700a3432cc2e30aec1347e4ee729f7d93c484a76fa829f82c28bd29fa74309ddd095bc4d1aaaada694f989ec054ed45b7bdb1881f7322b6f683608a04bb94feb86e4d78349bb132881337e7e098d0f3bb6f73762ac930b2aa201f16553a5e501a365bbc4081ae7b505c67f6ab2f763b9a6582a19d8bd90579bf9a430baf9b384163a6bcb2aa9e0e284e1795ea419b9b898afbb22937f46ab5a2f95c7d1ea7b4f7b24670ded64714fe768501b3602b3e789341b40b06b679bf255e7a53ca34b282a8992c248633f20f4e2082a7df7ec6379294f39f538d6788d6ab70fed6d200527d82356cd0358a307c976a55f10c7ab566085e3af8a422ada4211eee8fd07edf40cb86d3e8bdad3d7171a9f7a09f88ae5c59f4aaafcbe5fb45360194bf63ca95d7de3c4b38c9e9610618ad819e073d1cb0291cecc328f00557a4225c2198ddca76c1bfbf545110542df18e1fda98125076d7b013ed6e58cc308900b993dbf99461d2448e5ebff576d6a9083ac3e77e6188c9361586b7c0ff03915677af000ca9c4ebd70ddfa1486b0214bc7657f74a62d1ffb511f8f5592a86ed7e2650289c2573ce230bd3ab244211706b227a2a449b7cb0568d5064623f048310977cd3bf0344989809490c38153d6938c60a2ef5ca113320821381b1aa478c91bf0d73ce0711fd878a20041c72e9728eb7ba9e9bf355f62b098c1635053f5e1886941431c91e05c7191dcfeeec514478878c0f3bf852175bbdf0a68ca2300d9d3638ca4bd1f3cc9c0d3afc05000ea266d37fcfbb38b09c9bc7137d9a2beed1eb7f0991f8974e46405e122891f894f570c83d3fd24909fdee391f2bfebc79557ce151239013f3ba0473f7f75a6b1414777359116ebe190942ecb757eb1e33ffa37d6a60c588bc4c9be0c061200f98a251ab65f4b8c95b4c0b4a2f9598cccb8c18770b56afb8b04a3351c32a7d6c626dcd17f744e30b98e9f9ed3c8556456228c5a680cb447af639f0d83bccb5bea7fa2f3f0db76d2485e63623e24e85f7af8175e86242705971cde6ca2022aaffc1dc76d25ba8fd5903c326bf7f8ababf6b46f0ad5f6f964e3ac5d40250a015ac8b401178b1d28cc50bd211cdcf968f134bcc9843bc3f92e4917e3be2f0e3b6dac2b2b57db4fe02de65e76bf09aa185dcab7fa13da6802139bae5096cfc9dad17c25927dd8b84465fa0ac81380235d5361ab2e3ff99bc1f13158fd1d6f7cd69702e234d1c80d9d1ec6ce864b33edcf39fa115a936d624a6459c55547ab6a1b9f136e1814284a87d75b1d9395e09b16678b4bbfe724343bf2e8a1a0b5f9b40eac5bd5aacf3101da62690605e21bf1bf7adf5622661f2f1d844dedc7858ac31fc2cee6a62898dff2dcc432d4f768ffbcbb84ffd72de40196031105df315c52bb9880c6cf8ccdfada5425827dfdebf7a4c30ed4003c7faf7cd702826cff96ba3cdcc2fd7686bd7a30a12fe91532566b2e0192f9bd78d4c71d5d05da3dc5ad907accc7d8393a272b10aa418b1004f63a18dfe665472c2f1830613dbed728cf4b7146f4f3a365bdc42747730e6ef958232a3ed76dadfbbf1bd4d646468c59e07f022277a923a700fd5b4722b714cc17d836f997dcc5985e6ccabc5b909f59fb044dd014208e92906925c57e2381c68f751cca8c322618ad37d40cbbcf1374b869baafa6d24843cb2168dc82c78532b8b9afd631b3a3cfd16a03199e094d355191a870cc26cd67f7260aff14e20c92faf97502f2c91e7cdea5388ea18df0e10d7b00b645ba1a9d7d2f8e3bc7e1ba823ab5df7851425e403228f66558c8c78a3093de6ae9dba57fa0bde02665a21130b7fc2e92ff4f57de9371c1d004cee6a8ff11c7187145fdbe545b9965bb793c7bea95fff5c4ef26cf5e5e20b7c72fe7c21710ea14fdadd27ce6beedd09d601adf116af7780b53fe895cb7290ae3d04e8403698de2e2d8753918d7d8258377536943596046df313d6f6afa2b945f166533ca4345e324c33490e84e9aa10ad25f9904136218981e3468fa928cc173deca41906a5688e01eaffec0e19dce1773d2939805cd1c4ad50241df8d22aa257fd4f4bf8f40a2c866856bcd7e88d9d81444812320cba29216ba3aca319a64b47a29b80d068898711aed36c7667c839c3523d17c13e28c0205913ed1a91276ed78a7a44649523b5e0c118f421c9b5f6b6eaad38bf00ebdc11c31b49ebe323e143d27abf3d7befd799577f0be964e9612d9b65fa8bbdd4c085863d1cffa6eba6b8aaa98ce962e70bc846bf4ba38a2463a352dc3c9cbe3e8f8fdda522c5395f0530a6fb1995e37ba6571daac038d5858e40912a4ff216b20eca0515a002634edffc13d0109ce16381f187b648a7b946d2f7f2b6b7de3232c587bff63b928afc86fe1fb1ee4855a570c4b73f22d11da0fcfd2c82274ba992de69e1a5f0a95c7e404a3ddc312aa2834c57e7c134f3ac445514a3bfcdce678e88f9e0ed3d8982ae47a677e4f9560f0dfc310a95a93f00708983640a93d19c104ca97239a7e9b732852bfb9dc4b36b3995e5a495c603a75a53e72bb505de61f83eef1cbe2f945262958b8a3fc653460cad49e7438daa9bd571010d012a578dab1c688125695e714e02403bab3daa972130622e5d1014e2626ac161ce54eae1e8fc30ac4ae1da09e0b0ef1cf5e579836cdb49e6d8b000c89fb92644b17bdb7e136f9cd506e1dc56d5d17daa211b6b649ec66da6ea5b5999bf0573c3d2796f", 0xf00}], 0x3, &(0x7f0000001bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=r11, @ANYBLOB, @ANYRES32=r8, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32, @ANYRES32=r14, @ANYRES32, @ANYRES32=r15, @ANYRES32=r6, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=r28, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r29, @ANYRES32, @ANYRES32, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r31, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000", @ANYRES32=r7, @ANYRES32, @ANYRES32=r32, @ANYBLOB='\x00\x00\x00\x00'], 0xe1, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}], 0x4, 0x4c010) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r10, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) r33 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r33, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) [ 1358.687664][T20948] overlayfs: conflicting lowerdir path 13:32:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc092010}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@deltaction={0xbc, 0x31, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x4c, 0x1, [{0x18, 0x1e, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0xffff}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x800}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x1f}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x200}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x84}, 0x20000) fallocate(r3, 0x10, 0x0, 0x200) 13:32:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x60000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8fff2fffffeffffff2d6405000000000065040400010000000404000001007d60000000850000000d000000b7000000000000009500"/99], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x135}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100004000636c77fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 13:32:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1359.232391][T20929] IPVS: ftp: loaded support on port[0] = 21 [ 1359.310272][T20980] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1359.339220][T20980] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1359.362026][T20980] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$dupfd(r6, 0xc0a, r4) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000140)={r4, r1, 0x9, 0xab, &(0x7f0000000080)="102ac7b2d979bbed5ae1af1d98a6b353ea8353c9cc482c7aa41f88a2ed796d4522dacfe2f34f20fd4c31b870bde87ee19bd577fec3bc10bb5fd5bd3b9eb6f570c718068e100db3a544b4c3e3afc4549cfca7f285726e7c06881552b65fc2da4a8053f6358d59e6bc93a9b98cf40708074bde4e0f118317bd418c1b3c71f236f3464df0518a32ce54c6e223e6d43932ef60401b760f961a100babbe51a0482bf8eb7a7e1f0763a9ec1cef4a", 0x40, 0x4, 0x0, 0x4d, 0x0, 0x5, 0x80, 'syz0\x00'}) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB], 0x3}}, 0xa8126e388bd72b80) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000004}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r7, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x16, 0x10}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004010}, 0x42046) r8 = fcntl$dupfd(r1, 0x0, r0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000380)=@int=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r11, 0x10, 0x0, 0x200) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r13, 0x0, r12) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r13, 0x8936, &(0x7f0000000540)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3d, r14}) 13:32:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1359.565971][ T27] audit: type=1804 audit(1577626363.891:186): pid=20965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1593/bus" dev="sda1" ino=17156 res=1 [ 1359.629458][T20997] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1359.673833][T20997] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1359.682668][T20997] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1359.714093][ T27] audit: type=1804 audit(1577626364.021:187): pid=20969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1593/bus" dev="sda1" ino=17156 res=1 13:32:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0xa00}, 0x2a0}) 13:32:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x62000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) fallocate(r4, 0x10, 0x8000000, 0x200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$IP_VS_SO_SET_EDIT(r7, 0x0, 0x483, &(0x7f0000000000)={0x2f, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x3, 'wrr\x00', 0x4, 0x0, 0x17}, 0x2c) 13:32:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:45 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) 13:32:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0xe26e, 0x8, 0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket(0x5, 0x8000a, 0x2) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffecd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_open_dev$audion(0x0, 0x100000000, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001a80)=0x1a2) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000300)=0x6) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) close(r6) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r8 = getpid() write$cgroup_pid(r7, &(0x7f00000036c0), 0x12) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r10 = open(&(0x7f0000001900)='./bus/file0\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800)=0x0, &(0x7f0000001840), &(0x7f0000001880)) getgid() r12 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r12, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r12, 0x4028af11, &(0x7f0000000040)) r13 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r14 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r14, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r14, 0x4028af11, &(0x7f0000000040)) r15 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r15, 0x4028af11, &(0x7f0000000040)) r16 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r16, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r16, 0x4028af11, &(0x7f0000000040)) r17 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r17, 0xaf01, 0x0) r18 = getpid() getpgid(r18) r19 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r19, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r19, 0x0) r20 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r19, r20) r21 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r21, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r21, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) r23 = dup2(r22, r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) r24 = socket$inet_udplite(0x2, 0x2, 0x88) r25 = socket$inet6_udp(0xa, 0x2, 0x0) r26 = fcntl$dupfd(r25, 0x0, r24) ioctl$sock_SIOCGIFBR(r26, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r26, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) r27 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r27, 0x29, 0x22, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000280)=0xfffffffffffffec8) r28 = getegid() r29 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r30 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r30, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r30, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) r31 = getpid() setuid(0x0) r32 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r32, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r32, 0x4028af11, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003140)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x20000000}, {&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f00000004c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, {&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000580)="662e72720f2a216d54aa17e89c0d449032e652373ac558b7367ab3499e1527e088ccfe6e9e9da1cb7ef6af600fcc160d65b8cb23fcb40c603f34c8deab3dcea55f929ea931bcd0b1261ea7e8dca5c8efc159cd143b744301ee123b95d1efdcfab1beb4d31d7eeedb9306d3fcb6fe", 0x6e}, {&(0x7f0000000600)="9821d0f458fec4b2b88880057c6cbf1f75883f3d67c5ca23b788c472d59e9826fcb02b3cc96e881e4bb6c2f7a64506eda4f7d440b87ba40403a85446d4e222aad74f9bfc9ee12ef570fd6254f984", 0x4e}, {&(0x7f0000000680)="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", 0xf00}], 0x3, &(0x7f0000001bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32=r11, @ANYBLOB, @ANYRES32=r8, @ANYRES32, @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32, @ANYRES32=r14, @ANYRES32, @ANYRES32=r15, @ANYRES32=r6, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=r28, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r29, @ANYRES32, @ANYRES32, @ANYRES32=r10, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r31, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000", @ANYRES32=r7, @ANYRES32, @ANYRES32=r32, @ANYBLOB='\x00\x00\x00\x00'], 0xe1, 0x2008044}, {&(0x7f0000001d00)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}], 0x4, 0x4c010) write$P9_RWALK(r10, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r10, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r10, 0x4c07) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10d022, 0x8000000) r33 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r33, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) [ 1361.366235][T21034] IPVS: set_ctl: invalid protocol: 47 172.30.1.1:20003 [ 1361.418131][T21043] IPVS: set_ctl: invalid protocol: 47 172.30.1.1:20003 13:32:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1361.461609][T21045] IPVS: ftp: loaded support on port[0] = 21 [ 1361.468412][T21037] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1361.477829][T21037] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1361.488207][ T9713] tipc: TX() has been purged, node left! [ 1361.494639][T21037] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:45 executing program 1: socket(0xa, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'brout\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xff\xff\xff\xff\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[]}, 0x78) 13:32:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x68000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40, 0x5) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x101000, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@nodevmap='nodevmap'}, {@afid={'afid', 0x3d, 0x6}}, {@cache_loose='cache=loose'}, {@loose='loose'}, {@debug={'debug', 0x3d, 0x47a}}, {@aname={'aname', 0x3d, '-wlan0,keyring!cpuset'}}, {@cache_mmap='cache=mmap'}], [{@dont_hash='dont_hash'}]}}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1361.648468][ T9713] tipc: TX() has been purged, node left! [ 1361.655906][ T9713] tipc: TX() has been purged, node left! [ 1361.686499][ T9713] tipc: TX() has been purged, node left! 13:32:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1361.853113][T21063] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1361.910950][T21063] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1361.934697][T21063] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1362.119069][T21077] print_req_error: 267 callbacks suppressed [ 1362.119099][T21077] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.122944][ T27] audit: type=1804 audit(1577626366.451:188): pid=21046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1594/bus" dev="sda1" ino=17303 res=1 [ 1362.126136][T21076] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.150573][T21079] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.162051][T21075] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.173933][T21074] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.210210][T21063] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 13:32:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1362.212194][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.218406][T21078] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1362.228338][ T2503] buffer_io_error: 258 callbacks suppressed [ 1362.228351][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.254844][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.265786][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.275394][ T2503] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.281139][ T27] audit: type=1804 audit(1577626366.581:189): pid=21047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1594/bus" dev="sda1" ino=17303 res=1 [ 1362.286449][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.319958][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1362.330948][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.353694][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.361999][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.371507][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.379755][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.388991][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.397512][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1362.641374][T21045] IPVS: ftp: loaded support on port[0] = 21 13:32:47 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x2000}, 0x2a0}) 13:32:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x10000, 0x18102) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) fallocate(r3, 0x10, 0x0, 0x200) 13:32:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:47 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x40) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x0, 0x590}]}, 0xc, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x280802, 0xd8) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000280)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8983, &(0x7f0000000200)={0x8, 'bond0\x00', {'caif0\x00'}, 0x6}) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) openat$cgroup_type(r7, &(0x7f00000002c0)='\x1c\x00\xe0\x01\b\x01\x00\x00\x1e\x00', 0x2, 0x0) preadv(r3, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154, 0x9a}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) 13:32:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6a020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000e4", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0xfffffffffffffffc], 0x100000}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="1b0000833db23400", 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0xffffffffffffef7f) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VFIO_IOMMU_UNMAP_DMA(r4, 0x3b72, &(0x7f0000000280)={0x18, 0x1, 0x7}) ioctl$VIDIOC_G_INPUT(r10, 0x80045626, &(0x7f0000000240)) 13:32:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000000c0)={0x3800000, 0x5, 0x0, 0x3, 0x53800000, 0x8001}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fallocate(r4, 0x10, 0xfffffffffffffffd, 0x200) r9 = msgget$private(0x0, 0x0) msgsnd(r9, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r9, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0xffffffff00000000, 0x0) msgctl$IPC_STAT(r9, 0x2, &(0x7f0000000100)=""/240) msgctl$IPC_STAT(r9, 0x2, &(0x7f0000000000)=""/18) 13:32:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1363.625263][T21115] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1363.635525][T21120] IPVS: ftp: loaded support on port[0] = 21 [ 1363.658675][T21115] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1363.713931][T21115] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x400, 0x1, 0x4, 0x2020000, 0x2, {}, {0x1, 0xc, 0x6, 0x3f, 0x9, 0x6, "4f82716f"}, 0xe1, 0x4, @fd, 0x1, 0x0, 0xffffffffffffffff}) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x98, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa0}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xa}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1a}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}]}, 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) r3 = fcntl$dupfd(r1, 0x0, r0) prctl$PR_SET_SECUREBITS(0x1c, 0x31) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) 13:32:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0xa00}, 0x2a0}) 13:32:48 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0x2, 0x102, 0x1, {0x0, 0x7, 0x1, 0x9}}) recvfrom$inet6(r2, &(0x7f0000000300)=""/223, 0xdf, 0x0, 0x0, 0x0) [ 1364.073301][T21139] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1364.080087][T21139] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1364.128572][T21139] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1364.332110][T21154] IPVS: ftp: loaded support on port[0] = 21 [ 1364.425058][T25123] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1364.838367][T21120] IPVS: ftp: loaded support on port[0] = 21 13:32:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x4000}, 0x2a0}) 13:32:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6a030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x5, 0x2, 0xb23b}, 0x3c, 0x10000, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x3800000000, 0x800000000000007, 0x200000}) fallocate(r3, 0x10, 0x0, 0x200) 13:32:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:49 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000000c0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000000)={0x2, 0x102, 0x1, {0x0, 0x7, 0x1, 0x9}}) recvfrom$inet6(r2, &(0x7f0000000300)=""/223, 0xdf, 0x0, 0x0, 0x0) 13:32:49 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x2000}, 0x2a0}) [ 1365.397804][T21192] IPVS: ftp: loaded support on port[0] = 21 [ 1365.423278][T21185] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) fcntl$dupfd(r7, 0x0, r8) pwrite64(r6, &(0x7f0000000240)="181b9c8475a8bb8cd73ad5818b81898af9621bf67582c34df2e836a797b82641e66ffacfd3f185464060c92d0117a367b6f5ed3367", 0x35, 0xfffffffffffffff9) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000000)={r5}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280)={r5, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={r5, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={r9, 0x4}, &(0x7f0000000200)=0x8) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r10, 0x10, 0x0, 0x200) rt_sigprocmask(0x0, &(0x7f0000000000)={0x7}, &(0x7f0000000080), 0x8) [ 1365.442627][T21185] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1365.490574][T21185] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1365.500087][T21198] IPVS: ftp: loaded support on port[0] = 21 13:32:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1365.789504][T21203] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1365.847555][T21203] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1365.880441][T21203] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6c000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1366.112269][T21192] IPVS: ftp: loaded support on port[0] = 21 13:32:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1366.280614][ T9713] tipc: TX() has been purged, node left! [ 1366.286546][ T9713] tipc: TX() has been purged, node left! [ 1366.309796][ T9713] tipc: TX() has been purged, node left! [ 1366.502007][T21233] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1366.510647][T21233] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1366.525668][T21233] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x4800}, 0x2a0}) 13:32:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 13:32:51 executing program 0: ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r5}, 0x10) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000000)=0x7) fallocate(r6, 0x10, 0x0, 0x200) 13:32:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6c030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 1367.418580][T21264] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1367.437363][T21264] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fd) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) syslog(0x3, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x100) fallocate(r11, 0x38, 0x6, 0x200) 13:32:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x4000}, 0x2a0}) [ 1367.525363][T21264] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1367.542730][T21275] IPVS: ftp: loaded support on port[0] = 21 13:32:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3800) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x4001, 0x0, 0x3}, 0x1c) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 13:32:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 1367.798754][T21290] IPVS: ftp: loaded support on port[0] = 21 [ 1367.858202][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1367.864079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1367.930490][T21291] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1367.938231][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1367.944018][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:32:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1367.971471][T21291] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1368.080027][T21291] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1368.098214][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1368.104193][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1368.318061][T21275] IPVS: ftp: loaded support on port[0] = 21 13:32:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x4c00}, 0x2a0}) 13:32:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r4) preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}, {&(0x7f0000000140)=""/70, 0x46}, {&(0x7f00000001c0)=""/236, 0xec}, {&(0x7f0000000380)=""/142, 0x8e}], 0x4, 0xffffffff) 13:32:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x70010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:53 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) sync() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) shutdown(r2, 0x1) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x4, 0x2, 0x101, 0x3ff, 'syz0\x00', 0x69a}, 0x1, [0x7, 0x0, 0xf4, 0x2, 0x4, 0x80000001, 0xd50e, 0x100000000, 0x7fff, 0x0, 0x3ff, 0x8, 0xb6cd, 0x10000, 0x6dbb, 0x3ff, 0x8, 0x6, 0x8, 0x2, 0x0, 0x3, 0x5, 0x2, 0xca, 0x7, 0x88da, 0x6, 0x3f, 0x9, 0x0, 0x3ff, 0x3, 0x9, 0xfff, 0x9, 0xfffffffffffff22c, 0x3, 0x9, 0xd5, 0x9, 0x765, 0x100000001, 0x0, 0x80000000, 0x2, 0x401, 0x7, 0x6, 0x0, 0x3, 0x7, 0x10000, 0x5, 0x0, 0x68a3, 0x10000, 0x0, 0x0, 0x8, 0x100, 0x2, 0x4, 0x0, 0x0, 0x800, 0x0, 0x85a8, 0x0, 0xae, 0x200, 0x0, 0x6, 0x7, 0x7, 0x3, 0x1f, 0x3, 0x8, 0x0, 0x8, 0x0, 0x3, 0x74, 0x1, 0x8001, 0x1ff, 0xc, 0x8, 0x7, 0x0, 0x3, 0x5b, 0x7, 0xf8cd, 0x7ff, 0x8, 0x80, 0x0, 0x6537, 0x2, 0x8, 0x89e560b, 0x8, 0x0, 0x3, 0x7, 0x0, 0x200, 0xf0, 0x5, 0x1, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2, 0xfffffffffffffffb, 0x101, 0xff89, 0x1, 0xfff, 0x0, 0x5, 0x80000000, 0xffffffffffffc193]}) 13:32:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1368.986623][T21337] IPVS: ftp: loaded support on port[0] = 21 [ 1369.048968][T21333] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1369.061825][T21333] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1369.115457][T21333] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x80c, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x472bb8a1afef4e15, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) 13:32:53 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) r3 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r4}, &(0x7f0000000480)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "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"}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) fstatfs(r6, &(0x7f0000000080)=""/179) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000680)={r2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r4, r6, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r10) add_key(&(0x7f0000000380)='ceph\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000600)="f0dd73f2ca58e9abe5e1cede9d96254f4847b599ecca24515d554ebba6739ae17300dca7cb4d5a57b5d315b5c6a68a35b36887b538692eeba0f0eeea5045f6f8f8a9433f9d4dfc35ab36b3f22bc4", 0x4e, 0xfffffffffffffffc) r11 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r11) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) 13:32:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x72030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1369.502264][T21365] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 13:32:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1369.925546][T21365] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1369.940872][T21374] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1369.965997][T21374] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1369.990150][T21374] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1370.162757][T21337] IPVS: ftp: loaded support on port[0] = 21 13:32:54 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6000}, 0x2a0}) 13:32:54 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) sync() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) shutdown(r2, 0x1) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x4, 0x2, 0x101, 0x3ff, 'syz0\x00', 0x69a}, 0x1, [0x7, 0x0, 0xf4, 0x2, 0x4, 0x80000001, 0xd50e, 0x100000000, 0x7fff, 0x0, 0x3ff, 0x8, 0xb6cd, 0x10000, 0x6dbb, 0x3ff, 0x8, 0x6, 0x8, 0x2, 0x0, 0x3, 0x5, 0x2, 0xca, 0x7, 0x88da, 0x6, 0x3f, 0x9, 0x0, 0x3ff, 0x3, 0x9, 0xfff, 0x9, 0xfffffffffffff22c, 0x3, 0x9, 0xd5, 0x9, 0x765, 0x100000001, 0x0, 0x80000000, 0x2, 0x401, 0x7, 0x6, 0x0, 0x3, 0x7, 0x10000, 0x5, 0x0, 0x68a3, 0x10000, 0x0, 0x0, 0x8, 0x100, 0x2, 0x4, 0x0, 0x0, 0x800, 0x0, 0x85a8, 0x0, 0xae, 0x200, 0x0, 0x6, 0x7, 0x7, 0x3, 0x1f, 0x3, 0x8, 0x0, 0x8, 0x0, 0x3, 0x74, 0x1, 0x8001, 0x1ff, 0xc, 0x8, 0x7, 0x0, 0x3, 0x5b, 0x7, 0xf8cd, 0x7ff, 0x8, 0x80, 0x0, 0x6537, 0x2, 0x8, 0x89e560b, 0x8, 0x0, 0x3, 0x7, 0x0, 0x200, 0xf0, 0x5, 0x1, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2, 0xfffffffffffffffb, 0x101, 0xff89, 0x1, 0xfff, 0x0, 0x5, 0x80000000, 0xffffffffffffc193]}) 13:32:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) 13:32:54 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) r3 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r4}, &(0x7f0000000480)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "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"}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) fstatfs(r6, &(0x7f0000000080)=""/179) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000680)={r2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r4, r6, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r10) add_key(&(0x7f0000000380)='ceph\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000600)="f0dd73f2ca58e9abe5e1cede9d96254f4847b599ecca24515d554ebba6739ae17300dca7cb4d5a57b5d315b5c6a68a35b36887b538692eeba0f0eeea5045f6f8f8a9433f9d4dfc35ab36b3f22bc4", 0x4e, 0xfffffffffffffffc) r11 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r11) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) 13:32:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x74000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1370.605293][T21411] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1370.620183][ T9713] tipc: TX() has been purged, node left! 13:32:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80, 0x40) [ 1370.678296][T21416] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1370.695976][T21416] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1370.734378][T21416] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1370.738576][ T9713] tipc: TX() has been purged, node left! [ 1370.793203][T21423] IPVS: ftp: loaded support on port[0] = 21 13:32:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1370.874531][ T9713] tipc: TX() has been purged, node left! [ 1370.895510][ T9713] tipc: TX() has been purged, node left! [ 1370.940707][ T9713] tipc: TX() has been purged, node left! [ 1370.962131][ T9713] tipc: TX() has been purged, node left! 13:32:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x74030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:55 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) sync() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) shutdown(r2, 0x1) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x4, 0x2, 0x101, 0x3ff, 'syz0\x00', 0x69a}, 0x1, [0x7, 0x0, 0xf4, 0x2, 0x4, 0x80000001, 0xd50e, 0x100000000, 0x7fff, 0x0, 0x3ff, 0x8, 0xb6cd, 0x10000, 0x6dbb, 0x3ff, 0x8, 0x6, 0x8, 0x2, 0x0, 0x3, 0x5, 0x2, 0xca, 0x7, 0x88da, 0x6, 0x3f, 0x9, 0x0, 0x3ff, 0x3, 0x9, 0xfff, 0x9, 0xfffffffffffff22c, 0x3, 0x9, 0xd5, 0x9, 0x765, 0x100000001, 0x0, 0x80000000, 0x2, 0x401, 0x7, 0x6, 0x0, 0x3, 0x7, 0x10000, 0x5, 0x0, 0x68a3, 0x10000, 0x0, 0x0, 0x8, 0x100, 0x2, 0x4, 0x0, 0x0, 0x800, 0x0, 0x85a8, 0x0, 0xae, 0x200, 0x0, 0x6, 0x7, 0x7, 0x3, 0x1f, 0x3, 0x8, 0x0, 0x8, 0x0, 0x3, 0x74, 0x1, 0x8001, 0x1ff, 0xc, 0x8, 0x7, 0x0, 0x3, 0x5b, 0x7, 0xf8cd, 0x7ff, 0x8, 0x80, 0x0, 0x6537, 0x2, 0x8, 0x89e560b, 0x8, 0x0, 0x3, 0x7, 0x0, 0x200, 0xf0, 0x5, 0x1, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2, 0xfffffffffffffffb, 0x101, 0xff89, 0x1, 0xfff, 0x0, 0x5, 0x80000000, 0xffffffffffffc193]}) 13:32:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @reserved="688dba83c94e10e327b32c31d9af82bccb7cafbbd2dd97ced75f638d1170f81d"}}) fallocate(r3, 0x10, 0x0, 0x200) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000000c0)=0x81) [ 1371.449185][T21455] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1371.461622][T21455] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1371.501179][T21455] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1371.581043][T21434] IPVS: ftp: loaded support on port[0] = 21 13:32:57 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6800}, 0x2a0}) 13:32:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:57 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) sync() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) shutdown(r2, 0x1) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x4, 0x2, 0x101, 0x3ff, 'syz0\x00', 0x69a}, 0x1, [0x7, 0x0, 0xf4, 0x2, 0x4, 0x80000001, 0xd50e, 0x100000000, 0x7fff, 0x0, 0x3ff, 0x8, 0xb6cd, 0x10000, 0x6dbb, 0x3ff, 0x8, 0x6, 0x8, 0x2, 0x0, 0x3, 0x5, 0x2, 0xca, 0x7, 0x88da, 0x6, 0x3f, 0x9, 0x0, 0x3ff, 0x3, 0x9, 0xfff, 0x9, 0xfffffffffffff22c, 0x3, 0x9, 0xd5, 0x9, 0x765, 0x100000001, 0x0, 0x80000000, 0x2, 0x401, 0x7, 0x6, 0x0, 0x3, 0x7, 0x10000, 0x5, 0x0, 0x68a3, 0x10000, 0x0, 0x0, 0x8, 0x100, 0x2, 0x4, 0x0, 0x0, 0x800, 0x0, 0x85a8, 0x0, 0xae, 0x200, 0x0, 0x6, 0x7, 0x7, 0x3, 0x1f, 0x3, 0x8, 0x0, 0x8, 0x0, 0x3, 0x74, 0x1, 0x8001, 0x1ff, 0xc, 0x8, 0x7, 0x0, 0x3, 0x5b, 0x7, 0xf8cd, 0x7ff, 0x8, 0x80, 0x0, 0x6537, 0x2, 0x8, 0x89e560b, 0x8, 0x0, 0x3, 0x7, 0x0, 0x200, 0xf0, 0x5, 0x1, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2, 0xfffffffffffffffb, 0x101, 0xff89, 0x1, 0xfff, 0x0, 0x5, 0x80000000, 0xffffffffffffc193]}) 13:32:57 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) r3 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r4}, &(0x7f0000000480)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "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"}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) fstatfs(r6, &(0x7f0000000080)=""/179) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000680)={r2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r4, r6, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r10) add_key(&(0x7f0000000380)='ceph\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000600)="f0dd73f2ca58e9abe5e1cede9d96254f4847b599ecca24515d554ebba6739ae17300dca7cb4d5a57b5d315b5c6a68a35b36887b538692eeba0f0eeea5045f6f8f8a9433f9d4dfc35ab36b3f22bc4", 0x4e, 0xfffffffffffffffc) r11 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r11) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) 13:32:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x76010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r5 = dup2(0xffffffffffffffff, r4) setsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @remote}, 0xc) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_void(r7, 0x1, 0x2e57e233020160a, 0x0, 0x0) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r8, 0x10, 0x0, 0x200) 13:32:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1373.101521][T21492] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1373.129150][T21485] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1373.162971][T21498] IPVS: ftp: loaded support on port[0] = 21 [ 1373.169958][T21485] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1373.234108][T21485] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x246222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) 13:32:57 executing program 5: socket$inet6_sctp(0xa, 0x0, 0x84) sync() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) shutdown(r2, 0x1) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000400)={{0x4, 0x2, 0x101, 0x3ff, 'syz0\x00', 0x69a}, 0x1, [0x7, 0x0, 0xf4, 0x2, 0x4, 0x80000001, 0xd50e, 0x100000000, 0x7fff, 0x0, 0x3ff, 0x8, 0xb6cd, 0x10000, 0x6dbb, 0x3ff, 0x8, 0x6, 0x8, 0x2, 0x0, 0x3, 0x5, 0x2, 0xca, 0x7, 0x88da, 0x6, 0x3f, 0x9, 0x0, 0x3ff, 0x3, 0x9, 0xfff, 0x9, 0xfffffffffffff22c, 0x3, 0x9, 0xd5, 0x9, 0x765, 0x100000001, 0x0, 0x80000000, 0x2, 0x401, 0x7, 0x6, 0x0, 0x3, 0x7, 0x10000, 0x5, 0x0, 0x68a3, 0x10000, 0x0, 0x0, 0x8, 0x100, 0x2, 0x4, 0x0, 0x0, 0x800, 0x0, 0x85a8, 0x0, 0xae, 0x200, 0x0, 0x6, 0x7, 0x7, 0x3, 0x1f, 0x3, 0x8, 0x0, 0x8, 0x0, 0x3, 0x74, 0x1, 0x8001, 0x1ff, 0xc, 0x8, 0x7, 0x0, 0x3, 0x5b, 0x7, 0xf8cd, 0x7ff, 0x8, 0x80, 0x0, 0x6537, 0x2, 0x8, 0x89e560b, 0x8, 0x0, 0x3, 0x7, 0x0, 0x200, 0xf0, 0x5, 0x1, 0x80, 0x4, 0x0, 0x0, 0x20, 0x0, 0x2, 0xfffffffffffffffb, 0x101, 0xff89, 0x1, 0xfff, 0x0, 0x5, 0x80000000, 0xffffffffffffc193]}) [ 1373.538591][T21506] loop3: p1 < > p2 p3 < p5 p6 > p4 13:32:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:57 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) r3 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r4}, &(0x7f0000000480)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "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"}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x42000) fstatfs(r6, &(0x7f0000000080)=""/179) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$sock_SIOCGIFBR(r9, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f0000000680)={r2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r4, r6, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r10) add_key(&(0x7f0000000380)='ceph\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000600)="f0dd73f2ca58e9abe5e1cede9d96254f4847b599ecca24515d554ebba6739ae17300dca7cb4d5a57b5d315b5c6a68a35b36887b538692eeba0f0eeea5045f6f8f8a9433f9d4dfc35ab36b3f22bc4", 0x4e, 0xfffffffffffffffc) r11 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r11) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) [ 1373.566752][T21506] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1373.585774][T21506] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1373.601952][T21506] loop3: p5 could not be added: 12 13:32:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x78030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1373.765833][T21523] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1374.033029][T21498] IPVS: ftp: loaded support on port[0] = 21 [ 1374.118918][T21535] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1374.169412][T21535] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1374.219516][T21535] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:32:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6c00}, 0x2a0}) 13:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x800, 0x3, 0x3, 0x200, 0x6, "68b204a0f57cf25c"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r7 = dup2(r6, r6) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_RUN(r7, 0xae80, 0x0) 13:32:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:58 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x6000}, 0x2a0}) 13:32:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x0, 0xb, 0x1, 0x0, 0x0, {0x0, 0xf0ffff}}, 0x14}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 1374.418284][T21541] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1374.428207][ T9713] tipc: TX() has been purged, node left! [ 1374.441881][T21552] IPVS: ftp: loaded support on port[0] = 21 [ 1374.444020][T21549] Unknown ioctl 35090 [ 1374.452532][T21541] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:32:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1044010}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@newtclass={0x88, 0x28, 0x400, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x7, 0x5}, {0x18030, 0xfffe}, {0x10, 0xffe0}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x7672}}}, @TCA_RATE={0x8, 0x5, {0x81, 0xfd}}, @tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}, @tclass_kind_options=@c_netem={0xc, 0x1, 'netem\x00'}, @TCA_RATE={0x8, 0x5, {0x1f, 0x1}}, @tclass_kind_options=@c_multiq={0xc, 0x1, 'multiq\x00'}, @TCA_RATE={0x8, 0x5, {0x3, 0x6}}, @TCA_RATE={0x8, 0x5, {0x6, 0x7f}}, @TCA_RATE={0x8, 0x5, {0x40, 0x3}}, @TCA_RATE={0x8, 0x5, {0x81, 0x4}}]}, 0x88}, 0x1, 0x0, 0x0, 0x8000}, 0x80) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000200), &(0x7f0000000280)=0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000100000, 0x80000000000000, 0x1, 0xffff, r2, &(0x7f0000000000), 0xfffffffffffffe13}]) open(0x0, 0x0, 0x0) [ 1374.486843][T21549] Unknown ioctl 35090 13:32:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1374.581144][T21541] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1374.596535][T21557] IPVS: ftp: loaded support on port[0] = 21 [ 1374.602526][ T9713] tipc: TX() has been purged, node left! 13:32:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) connect$rxrpc(r5, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x8, @mcast2, 0x8}}, 0x24) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r6, 0x10, 0x0, 0x200) [ 1374.668408][ T9713] tipc: TX() has been purged, node left! [ 1374.674379][ T9713] tipc: TX() has been purged, node left! 13:32:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x7a000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:32:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:32:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e22, 0x10001, @dev={0xfe, 0x80, [], 0x20}, 0x7}, {0xa, 0x4e20, 0x8000, @mcast1, 0x10000}, 0x3f, [0xffffff7f, 0x3, 0x8, 0x8, 0x200, 0x5, 0x800, 0x350e]}, 0x5c) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) 13:32:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1375.109189][T21576] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1375.212330][T21576] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1375.261625][T21576] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1375.271943][ T27] audit: type=1804 audit(1577626379.601:190): pid=21560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1606/file0" dev="sda1" ino=16659 res=1 [ 1375.744363][T21557] IPVS: ftp: loaded support on port[0] = 21 13:33:01 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x7400}, 0x2a0}) 13:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x303004, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) fcntl$dupfd(0xffffffffffffffff, 0x1dc7a6f18e8b51b7, r11) setsockopt$sock_timeval(r10, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) fallocate(r9, 0x10, 0x0, 0x200) 13:33:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x85000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:01 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_int(r1, 0x0, 0x2c, &(0x7f0000000000)=0x7, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x163080, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(0xffffffffffffffff, 0x4148, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000340)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg(r7, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000040)={{0x0, 0x8f, 0x3, 0xf4, 0x4}, 0x3ff}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x65) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x4000800) 13:33:01 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) write$tun(r1, &(0x7f0000000400)=ANY=[], 0x0) r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0), 0x7f8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) geteuid() geteuid() getegid() syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000001000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000a72ccbdddb6396090c81022463f2d557a8bd25b2e99b0d3f035679151477e00dbdb53651150fc30dd05f3255359784805309520d30d86eae7d23794ba378a8391b942a782d70e1ce4527198b74cded94e0d5a49448c6f7167a90323edfdbbefda302ac1d3495c6c48d271621a90da748092dff349f8489dc38ff490707f683c4a36fa928f6c2c9efa14a9acaf7196052406727db785e937b9c831b952187c50675e6f86fd54603ab889bba8926e1046310bd84"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xb919559a114fa7f2) setresgid(0x0, 0x0, r4) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000200)='./file2\x00', &(0x7f0000000280)='v\xd00sehV\x96\xc1\x9c', 0x210040, 0x0) [ 1376.886187][T21647] IPVS: ftp: loaded support on port[0] = 21 13:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1376.992450][T21646] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1377.030644][T21646] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1377.140969][T21646] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1377.150692][T21639] overlayfs: conflicting lowerdir path 13:33:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/d\x96Rz\x01\x80\x15\x1e\r', 0x1e2100, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) 13:33:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xaf}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1377.351239][T21675] overlayfs: conflicting lowerdir path 13:33:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1377.973518][T21647] IPVS: ftp: loaded support on port[0] = 21 13:33:02 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x7a00}, 0x2a0}) 13:33:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x960f0000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x7fffffff}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) 13:33:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002008178a80016000a0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}]}, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x7) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x140, 0x0) recvmmsg(r3, &(0x7f0000002a40)=[{{&(0x7f0000000380)=@isdn, 0x80, &(0x7f0000001980)=[{&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/64, 0x40}, {&(0x7f0000001500)=""/135, 0x87}, {&(0x7f00000015c0)=""/216, 0xd8}, {&(0x7f00000016c0)=""/31, 0x1f}, {&(0x7f0000001700)=""/103, 0x67}, {&(0x7f0000001780)=""/249, 0xf9}, {&(0x7f0000001880)=""/4, 0x4}, {&(0x7f00000018c0)=""/187, 0xbb}], 0xa, &(0x7f0000001a40)=""/4096, 0x1000}, 0x5}], 0x1, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000002c80)=ANY=[@ANYBLOB="01000047ddd9fd271107a62c00c682372e52583085e2902114107165ea2e12e02df9102fef3cffdca84be77cd8472869a111bd163024bce93d3a1317ce63d2fe68c4e8cc80454d6b3533f8d53cb67a973cce55bc52a5c761fc159227ac0320cd138521d499ad6dffe3fa8b15dbf3ba59b15abb3f669b60f2c93bdf6cb433dbad41af3a386ad65d10656f9ab0c2532648", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r6, 0x9}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000002c0)={r6, 0x8, 0x2, 0x5ac2}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) rt_sigtimedwait(&(0x7f0000002b80)={0x7}, &(0x7f0000002bc0), &(0x7f0000002c40), 0x8) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000002a80)=""/226) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @broadcast, 0x0}, &(0x7f0000000200)=0xc) r9 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r9, 0xc4c85513, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002ec0)='/proc/self/net/pfkey\x00', 0x27b908fc8f1a68a3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0xfffffffffffffdc9) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000000), &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r9, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x9}, 0x8) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = dup2(r12, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000002e00)={0x0, r13, 0x7, 0x31, 0x6, 0xfffffffffffffffd}) r14 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x0, 0x28000) bind$rxrpc(r14, &(0x7f0000002e80)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, 0x24) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000002d40)={0x0, @in6={{0xa, 0x4e20, 0x8, @rand_addr="4dc83114fad4829b25b5970418173a9d"}}, 0xc3, 0x5, 0x800, 0x401, 0x7c0000}, &(0x7f0000000300)=0x98) bind$xdp(r7, &(0x7f0000000240)={0x2c, 0x0, r8, 0x29}, 0x10) 13:33:02 executing program 5: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="a446702111464f4d3faf8e70f78ad8e9476937472712877d4118629c787c59f04fb625fdedcb7286a5fa6e800099d834ee8049cce7132086be1cc13c41da639cfd2672c061b0e95076c3eb15cb5e7d73add7f1d543e056f4f91d94aa67103fd4face43677e63505fa113d5c9e2cd3963e84b69bfbbd7fa98d2ead878d36275280fd4956373c167a4ed06ffe8317c5eac5f4cbbc1949386c903c50ff4aee0cd57357ec2541ec15fc32d282e783904304f2397d02dfb3604c8d2f6495f3f7341b6e82c2d34f725896de528ae6a26727ae093998974dbcf86d0cc53f8ca7287ce3bc0f3eead48558b5ee0744c2ef20d7f8acb0617dbf3", 0xf5, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0xb8, 0x0, 0xb8, 0x0, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3f, 'syz0\x00'}}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_hsr\x00', 'nr0\x00'}, 0x0, 0x1c8, 0x1f0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0xf65b, 0x1, 0x7fff, 0x8}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x8000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x6, 0x3ff, 0x1, 0x407}) [ 1378.218839][T21718] xt_NFQUEUE: number of total queues is 0 [ 1378.239769][T21725] xt_NFQUEUE: number of total queues is 0 [ 1378.245932][ T9713] tipc: TX() has been purged, node left! [ 1378.252152][ T9713] tipc: TX() has been purged, node left! 13:33:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1378.270063][T21721] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1378.286401][ T9713] tipc: TX() has been purged, node left! [ 1378.290717][T21721] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1378.299662][ T9713] tipc: TX() has been purged, node left! [ 1378.305894][ T9713] tipc: TX() has been purged, node left! 13:33:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1378.323405][T21730] IPVS: ftp: loaded support on port[0] = 21 13:33:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:02 executing program 5: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="a446702111464f4d3faf8e70f78ad8e9476937472712877d4118629c787c59f04fb625fdedcb7286a5fa6e800099d834ee8049cce7132086be1cc13c41da639cfd2672c061b0e95076c3eb15cb5e7d73add7f1d543e056f4f91d94aa67103fd4face43677e63505fa113d5c9e2cd3963e84b69bfbbd7fa98d2ead878d36275280fd4956373c167a4ed06ffe8317c5eac5f4cbbc1949386c903c50ff4aee0cd57357ec2541ec15fc32d282e783904304f2397d02dfb3604c8d2f6495f3f7341b6e82c2d34f725896de528ae6a26727ae093998974dbcf86d0cc53f8ca7287ce3bc0f3eead48558b5ee0744c2ef20d7f8acb0617dbf3", 0xf5, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0xb8, 0x0, 0xb8, 0x0, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3f, 'syz0\x00'}}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_hsr\x00', 'nr0\x00'}, 0x0, 0x1c8, 0x1f0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0xf65b, 0x1, 0x7fff, 0x8}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x8000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x6, 0x3ff, 0x1, 0x407}) [ 1378.403273][T21721] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:02 executing program 1: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="a446702111464f4d3faf8e70f78ad8e9476937472712877d4118629c787c59f04fb625fdedcb7286a5fa6e800099d834ee8049cce7132086be1cc13c41da639cfd2672c061b0e95076c3eb15cb5e7d73add7f1d543e056f4f91d94aa67103fd4face43677e63505fa113d5c9e2cd3963e84b69bfbbd7fa98d2ead878d36275280fd4956373c167a4ed06ffe8317c5eac5f4cbbc1949386c903c50ff4aee0cd57357ec2541ec15fc32d282e783904304f2397d02dfb3604c8d2f6495f3f7341b6e82c2d34f725896de528ae6a26727ae093998974dbcf86d0cc53f8ca7287ce3bc0f3eead48558b5ee0744c2ef20d7f8acb0617dbf3", 0xf5, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0xb8, 0x0, 0xb8, 0x0, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3f, 'syz0\x00'}}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_hsr\x00', 'nr0\x00'}, 0x0, 0x1c8, 0x1f0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0xf65b, 0x1, 0x7fff, 0x8}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x8000) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x6, 0x3ff, 0x1, 0x407}) [ 1378.617163][T21740] xt_NFQUEUE: number of total queues is 0 13:33:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x405000, 0x2000009, 0x400000000008a032, 0xffffffffffffffff, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x8a031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1a1801) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) [ 1378.721896][T21746] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1378.771172][T21746] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1378.830668][T21751] xt_NFQUEUE: number of total queues is 0 [ 1378.839217][T21746] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1379.010423][T21730] IPVS: ftp: loaded support on port[0] = 21 13:33:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x7, 0x7, 0x0, "91c3c7c910cafc99bd4e62bdce61d8587362bfa302edd6dd0c45e6fefe8e329b", 0x30314742}) 13:33:04 executing program 5: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='Gd\x00\x00\x00\xfe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x73ea, 0x200000000000df8, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp1\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') 13:33:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:04 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0xff00}, 0x2a0}) 13:33:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x405000, 0x2000009, 0x400000000008a032, 0xffffffffffffffff, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x8a031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1a1801) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) 13:33:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1380.785730][T21795] IPVS: ftp: loaded support on port[0] = 21 [ 1380.792464][T21785] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1380.810474][T21785] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1380.832595][ T9713] tipc: TX() has been purged, node left! 13:33:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x200) [ 1380.931184][T21785] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1381.018232][ T9713] tipc: TX() has been purged, node left! 13:33:05 executing program 5: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='Gd\x00\x00\x00\xfe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x73ea, 0x200000000000df8, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp1\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') 13:33:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1381.217160][ T9713] tipc: TX() has been purged, node left! 13:33:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r4, 0x5441, 0xa4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) mq_open(&(0x7f0000000000)='securitywlan1\x00', 0x80, 0x80, &(0x7f0000000080)={0x241c, 0x0, 0x401, 0x8}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0)={0x5}, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) fallocate(r5, 0x16, 0x0, 0x1) 13:33:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000001cc0)={@broadcast, @loopback, 0x0}, &(0x7f0000001d00)=0xc) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000001e00)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000001f00)=0xe8) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r14, @ANYBLOB="00000e00ffffffff0000000008000100636271001804020004040600000000000000000000000000000000000000000000000000007df10500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r14, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r18}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r18, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r17, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r18, @ANYBLOB="ecff1200000589310bc9cfcc997f43"], 0x24}}, 0x0) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r22}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r22, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r21, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r22, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) accept4$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002680)=0x14, 0x0) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r27}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r24, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r27, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r31}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r31, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r30, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r31, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r32 = socket$nl_route(0x10, 0x3, 0x0) r33 = socket$netlink(0x10, 0x3, 0x0) r34 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r34, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r33, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r35}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r32, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r35, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r34, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r35, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000002b00)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002c00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002c40)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002d40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003180)={0x0, @dev, @remote}, &(0x7f00000031c0)=0xc) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket$netlink(0x10, 0x3, 0x0) r41 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r41, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r41, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r40, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r42}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r39, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r42, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r41, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r42, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r43 = socket$nl_route(0x10, 0x3, 0x0) r44 = socket$netlink(0x10, 0x3, 0x0) r45 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r45, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r44, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r46}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r43, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r46, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r45, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r46, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004b80)={'vcan0\x00', 0x0}) r48 = socket$inet_udplite(0x2, 0x2, 0x88) r49 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r49, 0x0, r48) r50 = socket$nl_route(0x10, 0x3, 0x0) r51 = socket$netlink(0x10, 0x3, 0x0) r52 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r52, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r52, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r51, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r53}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r50, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r53, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r52, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r53, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$sock_SIOCDELRT(r48, 0x890c, &(0x7f0000004c00)={0x0, @l2={0x1f, 0x4, {0x0, 0x9, 0x9, 0x6, 0x2, 0xb1}, 0x9, 0x98}, @can={0x1d, r53}, @in={0x2, 0x4e20, @multicast2}, 0x2, 0x0, 0x0, 0x0, 0x2c9e, &(0x7f0000004bc0)='ip6_vti0\x00', 0xffff, 0x0, 0x91a6}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004d80)=0x14) r56 = socket$nl_route(0x10, 0x3, 0x0) r57 = socket$netlink(0x10, 0x3, 0x0) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r57, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r59}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r56, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r59, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r58, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r59, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000004e80)={0x0, @empty}, &(0x7f0000004ec0)=0xc) r61 = socket$nl_route(0x10, 0x3, 0x0) r62 = socket$netlink(0x10, 0x3, 0x0) r63 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r63, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r63, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r62, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r64}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r61, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r64, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r63, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r64, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004f00)={'team_slave_1\x00', r64}) r66 = socket$nl_route(0x10, 0x3, 0x0) r67 = socket$netlink(0x10, 0x3, 0x0) r68 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r68, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r68, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r67, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r69}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r66, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r69, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r68, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r69, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000005040)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000059c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000005980)={&(0x7f0000005080)={0x8f8, r6, 0x200, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r7}, {0x178, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8000, 0x4d, 0x6, 0x7fffffff}, {0x7, 0x4, 0xf9, 0x4}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x47a}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0xfc, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x81, 0x6, 0x6, 0x80}, {0xf5, 0x86, 0x9, 0xfffffffb}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0x3, 0x1, 0x23f4}]}}}]}}, {{0x8, 0x1, r22}, {0x12c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xb66f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r27}, {0x1e0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r37}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r38}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r42}}}]}}, {{0x8, 0x1, r46}, {0x130, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r47}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r54}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r55}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r59}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r60}}}]}}, {{0x8, 0x1, r65}, {0xfc, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r69}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r70}}}]}}]}, 0x8f8}, 0x1, 0x0, 0x0, 0x40018}, 0x8048025) r71 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r72 = creat(&(0x7f0000000140)='./bus\x00', 0x102) ioctl$MON_IOCQ_RING_SIZE(r72, 0x9205) fcntl$setstatus(r71, 0x4, 0x3800) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000100000, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) open(0x0, 0x0, 0x0) [ 1381.332003][T21810] print_req_error: 1538 callbacks suppressed [ 1381.332026][T21810] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.351195][T21808] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.364007][T21807] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.364025][T21809] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.364205][ T2502] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1381.389435][T21813] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.398662][ T2502] buffer_io_error: 1493 callbacks suppressed [ 1381.398675][ T2502] Buffer I/O error on dev loop3p4, logical block 4080, async page read [ 1381.416844][T21785] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1381.428386][T21809] blk_update_request: I/O error, dev loop3, sector 32752 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.435551][T21811] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.458288][ T2502] blk_update_request: I/O error, dev loop3, sector 32752 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1381.469817][ T2502] Buffer I/O error on dev loop3p4, logical block 4094, async page read [ 1381.478308][T21809] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1381.499996][ T2502] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1381.509095][ T2502] Buffer I/O error on dev loop3p4, logical block 1, async page read [ 1381.517283][ T2502] Buffer I/O error on dev loop3p4, logical block 4095, async page read [ 1381.526103][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1381.536332][ T2503] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1381.544426][ T2503] Buffer I/O error on dev loop3p4, logical block 1, async page read [ 1381.552651][ T2502] Buffer I/O error on dev loop3p4, logical block 1, async page read [ 1381.561137][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read 13:33:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x98000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:06 executing program 5: r0 = epoll_create1(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='Gd\x00\x00\x00\xfe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x73ea, 0x200000000000df8, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp1\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') 13:33:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) connect$netrom(r2, &(0x7f0000000080)={{0x3, @default}, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x48) fallocate(r3, 0x10, 0x0, 0x200) [ 1381.798888][T21828] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1381.847996][T21795] IPVS: ftp: loaded support on port[0] = 21 [ 1382.152568][T21847] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1382.223440][T21847] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1382.252404][T21847] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1382.488728][T21856] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1382.504580][T21856] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1382.530968][T21856] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair(0x11, 0x4, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r3, &(0x7f0000000100)=""/162, 0xa2, 0x10000, &(0x7f00000001c0)={0xa, 0x4e20, 0x8000, @local, 0x7}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) getsockopt$inet_int(r5, 0x0, 0x32, &(0x7f0000000000), &(0x7f0000000080)=0x4) fallocate(r4, 0x10, 0x0, 0x200) 13:33:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xa8020000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {}, 0x2a0}) 13:33:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1383.492051][T21888] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1383.504054][T21888] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1383.531757][T21888] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r4 = socket$netlink(0x10, 0x3, 0x14) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB], 0x3}}, 0xa8126e388bd72b80) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2120023}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xec, r5, 0x600, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xd}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xcc9c}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x90}, 0x4020840) fallocate(r3, 0x10, 0x0, 0x200) [ 1383.551087][T21898] IPVS: ftp: loaded support on port[0] = 21 13:33:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)=0x101) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000080)=0xfffff800) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, 0x0) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xfc, 0x10001) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 13:33:08 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r7 = getegid() getgroups(0x9, &(0x7f0000000500)=[r0, r1, r2, r3, 0x0, r4, r5, r6, r7]) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDCTL_DSP_RESET(r9, 0x5000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r9, 0xc058565d, &(0x7f0000000580)={0x1, 0x8, 0x4, 0x4000000, 0x4, {0x0, 0x2710}, {0xa, 0x2, 0xfc, 0xff, 0xf8, 0x7f, "63c9ccec"}, 0x3ff, 0x4, @offset=0x80000001, 0x6, 0x0, 0xffffffffffffffff}) write$FUSE_IOCTL(r10, &(0x7f0000000600)={0x20, 0x0, 0x1, {0x2, 0x4, 0x800, 0x9}}, 0x20) lsetxattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)=@known='trusted.overlay.upper\x00', &(0x7f00000006c0)='#\x00', 0x2, 0x9c4f046050253828) ioctl$sock_SIOCDELRT(r10, 0x890c, &(0x7f0000000740)={0x0, @xdp={0x2c, 0x8, 0x0, 0x3c}, @can={0x1d, 0x0}, @nfc={0x27, 0x0, 0x1, 0x1}, 0x9, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000700)='nr0\x00', 0x101, 0x4, 0x7}) bind$can_raw(r8, &(0x7f00000007c0)={0x1d, r11}, 0x10) getpid() fcntl$F_GET_RW_HINT(r10, 0x40b, &(0x7f0000000800)) setxattr$security_selinux(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='security.selinux\x00', &(0x7f00000008c0)='system_u:object_r:crond_exec_t:s0\x00', 0x22, 0x3) lgetxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)=@known='trusted.overlay.redirect\x00', &(0x7f0000000980)=""/138, 0x8a) ioctl$KVM_IRQ_LINE(r9, 0x4008ae61, &(0x7f0000000a40)={0x80000001, 0x1000}) syz_mount_image$ntfs(&(0x7f0000000a80)='ntfs\x00', &(0x7f0000000ac0)='./file0\x00', 0x7, 0x0, &(0x7f0000000b00), 0x1004a0, &(0x7f0000000b40)={[{@umask={'umask', 0x3d, 0x10000}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'trusted.overlay.upper\x00'}}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, '(eth0keyring$wlan0wlan1\'$/ppp0vmnet1@\'@bdeveth0GPLwlan1vmnet1selfmd5sum\xcbnodev'}}, {@smackfsfloor={'smackfsfloor'}}]}) ioctl$SIOCRSGL2CALL(r9, 0x89e5, &(0x7f0000000c40)=@bcast) r12 = syz_open_pts(0xffffffffffffffff, 0xac3a71e3e41775f3) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000c80)={0x9, 0x6, 0x2, 0x0, 0x0, [{{r12}, 0x1}, {{r10}, 0x3425}]}) syz_mount_image$hfs(&(0x7f0000000d00)='hfs\x00', &(0x7f0000000d40)='./file0\x00', 0x6, 0x6, &(0x7f0000001040)=[{&(0x7f0000000d80), 0x0, 0x4}, {&(0x7f0000000dc0)="6768441f954dc78c4711f2d305a4063af64e830928fb309f31b3312a403ecb309137c7ce6e17a7a5bc22af2515cc85c332cd5642cf3b966c6ff36d0546ec84bd6ddd1ee313d92c3c291361a891c6bb6127f85395c51a2b6058af9ec58e507549c827201b640fac8529a1a77e12186b9ad800be6b99ab0108dd5f65adf39538ee609aeedefde59746fc8fd1c3bfa77e9d1e42b8c45fc362edd474e438e9", 0x9d, 0x9}, {&(0x7f0000000e80)="44db050924f49aa57a0190e517d69fe87bc82f7f", 0x14, 0xb99}, {&(0x7f0000000ec0)="5b02c8f52219a70ac4523b7d3ef46225ee04b3b376800500b25f8ace84a2fa853193bbff6c03b9345768f381a4a03c19b8efc419d3ddd89418624b0bc19bd80a66639df949a3ff87617fa47d579f10e51130bfddfa013b601cea30a87e77e9d6587f0dfd1b3ae427d053a05d98f67a2c59c4820c6d0b496b866cd0014e53cb5c1df8c5dd0463f1fb9b23350f5ae3d8f6fa4f6ea40ab700bcd7c23e0bf7fab7c1b14d94e43096219911d41cd842d8d7d5647a78cadd138d78d534a86592ea0d855fe158385eb590f12c7fd6a8e86fda956b987f02c537e5634f5e", 0xda, 0xfffffffffffffffa}, {&(0x7f0000000fc0)="ef3fe89ae0c36f41360a7fa806c0ff7bd8c0a8608873426aac807f2e", 0x1c, 0x40}, {&(0x7f0000001000)="6e58b398e6cc12a1df787eac130644a3da9033a4b6aef52ea8bc24c13c792d1c7cc299fceeda0730dcae898bc7cba602", 0x30, 0x6e7}], 0x1040000, &(0x7f0000001100)={[{@type={'type', 0x3d, "1e4da39f"}}], [{@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCL_SCROLLCONSOLE(r8, 0x541c, &(0x7f0000001140)={0xd, 0x32d}) openat$audio(0xffffffffffffff9c, &(0x7f0000001180)='/dev/audio\x00', 0x500800, 0x0) r13 = clone3(&(0x7f0000001380)={0x80a31c00, &(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240), {0x13}, &(0x7f0000001280)=""/83, 0x53, &(0x7f0000001300)=""/18, &(0x7f0000001340)=[0x0, 0x0], 0x2}, 0x50) syz_open_procfs(r13, &(0x7f0000001400)='net/fib_triestat\x00') 13:33:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbab30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x200) 13:33:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x29cae2, 0x0) fallocate(r3, 0x10, 0x0, 0x200) [ 1384.068789][T21922] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1384.078405][T21922] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1384.105675][T21922] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbbb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 1384.550931][T21949] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1384.603707][T21949] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1384.665527][T21949] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1384.706395][T21898] IPVS: ftp: loaded support on port[0] = 21 [ 1384.968777][T21966] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1384.997048][T21966] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1385.009969][T21966] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x2}, 0x2a0}) 13:33:09 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) 13:33:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000040)) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r6, 0x0, 0xfffffffffffffe90, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {0x8, 0x1}]}, 0x54, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000600)={[], [{@fowner_lt={'fowner<', r8}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x66, 0x50, 0x61, 0x0, 0x34, 0x64], 0x2d, [0x0, 0x39, 0x61, 0x65], 0x2d, [0x79, 0x57, 0x37, 0x1], 0x2d, [0x34, 0xae, 0x38, 0x61], 0x2d, [0x3, 0x63, 0x31, 0x30, 0x31, 0x32, 0x65, 0x64]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'overlay\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup'}}, {@uid_lt={'uid<', r10}}, {@obj_user={'obj_user', 0x3d, 'selfem0$]-,2)'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_lt={'euid<', r12}}], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) setregid(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000003c0)={0x4, 0x4000, 0x7, 0x6, 0x8, 0x3}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x68000, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup2(r13, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) 13:33:09 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400022001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68+0\x99\x14k^nBx\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xaa001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80001d00c0d0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x5585942a, @loopback, 0x5}, @in6={0xa, 0x4e24, 0x401, @local, 0x7ff}], 0x38) 13:33:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbcb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1385.198573][ T9713] tipc: TX() has been purged, node left! [ 1385.206178][ T9713] tipc: TX() has been purged, node left! [ 1385.245409][ T9713] tipc: TX() has been purged, node left! 13:33:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1385.311717][T21985] IPVS: ftp: loaded support on port[0] = 21 [ 1385.436625][T21978] device nr0 entered promiscuous mode 13:33:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1385.498128][T21989] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1385.517973][T21989] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x800}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1385.570194][T21989] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000180)={0x0, {0x6, 0x7}}) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) r6 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc4c85513, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r8, 0x4040ae72, &(0x7f0000000140)={0x7, 0x3, 0x5, 0x0, 0x53}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000000)={r9}, &(0x7f00000000c0)=0xc) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r11, 0x84, 0x72, &(0x7f0000000000)={r12}, &(0x7f00000000c0)=0xc) r13 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r13, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r13, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r13, 0x84, 0xf, &(0x7f0000000100)={r12, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000380)={r12, 0x8}, 0x8) r14 = socket$inet6_udp(0xa, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r10) ioctl$sock_SIOCGIFBR(r15, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_TRY_EXT_CTRLS(r15, 0xc0205649, &(0x7f0000000240)={0x9f0000, 0x7, 0x7ff, r7, 0x0, &(0x7f0000000200)={0x9a090a, 0x0, [], @string=&(0x7f00000001c0)=0x1}}) getsockopt$inet_sctp_SCTP_CONTEXT(r16, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x20}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000280)={r9, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000)={r9}, &(0x7f0000000080)=0x8) 13:33:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:10 executing program 1: r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x2011, r0, 0x280000) mmap(&(0x7f0000000000/0x600000)=nil, 0x1fffff, 0x7ffffe, 0x4002011, r0, 0x0) [ 1386.123783][ T27] audit: type=1800 audit(1577626390.451:191): pid=21992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17417 res=0 [ 1386.425731][T21985] IPVS: ftp: loaded support on port[0] = 21 13:33:12 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x3}, 0x2a0}) 13:33:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 13:33:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbdb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80, 0x0) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000080)={0x8, "0634daec0bd303e79e8dd60d422d3886f34cfd1b015813081db9508a548dbd2f", 0x14a4c7a8c56ac6b0, 0x82, 0x9, 0x10, 0xb9a031b677037371}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$USBDEVFS_GETDRIVER(r6, 0x41045508, &(0x7f0000000100)={0x1, "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"}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r7, 0x10, 0x0, 0x200) 13:33:12 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 1387.859869][ T9713] tipc: TX() has been purged, node left! [ 1387.872659][T22080] IPVS: ftp: loaded support on port[0] = 21 [ 1387.899593][T22075] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1387.917260][T22075] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1387.925647][ T9713] tipc: TX() has been purged, node left! [ 1387.951866][ T9713] tipc: TX() has been purged, node left! 13:33:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) [ 1387.982105][T22075] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:12 executing program 5: 13:33:12 executing program 1: 13:33:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r4) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f0000000100)=0x2) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$IPT_SO_GET_INFO(r10, 0x0, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000000)=0x54) fallocate(r3, 0x10, 0x0, 0x200) 13:33:12 executing program 5: 13:33:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) [ 1388.620150][T22080] IPVS: ftp: loaded support on port[0] = 21 13:33:14 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4}, 0x2a0}) 13:33:14 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setns(r0, 0x0) 13:33:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbeb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x141}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff5f, 0x0, 0xffffff32}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:33:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 13:33:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) gettid() fallocate(r3, 0x10, 0x0, 0x200) 13:33:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'ra\n\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2, 0x3, 0x228, 0x0, 0x98, 0x0, 0x0, 0x98, 0x190, 0x190, 0x190, 0x190, 0x190, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x288) [ 1389.955609][T22137] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1389.995905][T22147] IPVS: ftp: loaded support on port[0] = 21 [ 1390.007190][T22137] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1390.041379][T22137] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1390.055185][T22151] xt_TCPMSS: Only works on TCP SYN packets [ 1390.088859][ T9713] tipc: TX() has been purged, node left! 13:33:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 13:33:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r6, 0x10, 0x40, 0x200) [ 1390.309080][T22156] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1390.320548][T22156] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 13:33:14 executing program 1: [ 1390.352310][T22156] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbfb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1390.786642][T22147] IPVS: ftp: loaded support on port[0] = 21 [ 1390.793206][T22179] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1390.800468][T22179] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1390.821860][T22179] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x5}, 0x2a0}) 13:33:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 13:33:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f0000000000)={0x6, 'ip6gretap0\x00', {0x2}, 0x20}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r4, 0x10, 0x0, 0x200) [ 1391.213629][T22202] IPVS: ftp: loaded support on port[0] = 21 [ 1391.598043][T22202] IPVS: ftp: loaded support on port[0] = 21 [ 1392.498214][ T9713] tipc: TX() has been purged, node left! [ 1392.688227][ T9713] tipc: TX() has been purged, node left! 13:33:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc0010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:17 executing program 1: 13:33:17 executing program 5: 13:33:17 executing program 2: 13:33:17 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6}, 0x2a0}) 13:33:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40000, 0x0) r7 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000000)={r8}, &(0x7f00000000c0)=0xc) r9 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000000)={r10}, &(0x7f00000000c0)=0xc) r11 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r11, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r11, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r11, 0x84, 0xf, &(0x7f0000000100)={r10, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000001c0)={r8, 0x1, 0x4, 0x8001, 0xe6a6, 0x9, 0x120, 0x4, {r10, @in={{0x2, 0x4e23, @local}}, 0x1, 0x10000, 0x96, 0x9, 0x5}}, &(0x7f0000000280)=0xb0) r12 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r12, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r12, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r12, 0x84, 0xf, &(0x7f0000000100)={r8, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f00000000c0)={r8, 0x4}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r5, 0xc0182101, &(0x7f0000000000)={0x0, 0x1f, 0x80000001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r13 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r13, 0x10, 0x0, 0x200) 13:33:17 executing program 5: [ 1392.961905][T22228] IPVS: ftp: loaded support on port[0] = 21 [ 1392.989588][T22226] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:17 executing program 2: [ 1393.021497][T22226] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1393.069805][T22226] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:17 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$sock(r0, &(0x7f0000004fc0)={&(0x7f0000004b80)=@nl=@unspec, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0}, 0x0) 13:33:17 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002a000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000000)="0f3536670f009abb000000660f38151efe87ba4200b88800ef2667f30f38f610dd230f30f2ab26262e0f01c4f4", 0xffffffffffffff23}], 0xaaaaaaaaaaaaba0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000002, 0x3, 0x2) r3 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) recvmmsg(r2, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 13:33:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x10, 0x0, 0x200) 13:33:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc0030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:18 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0) ftruncate(r0, 0x800799c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) finit_module(r0, 0x0, 0x0) 13:33:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000194c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 13:33:18 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) [ 1394.099489][T22287] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1394.171398][T22287] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1394.201809][T22287] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1394.316074][T22228] IPVS: ftp: loaded support on port[0] = 21 13:33:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7}, 0x2a0}) 13:33:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000100)={0x8, 0x79, 0x3, 0x1, 0x8}) r5 = semget$private(0x0, 0x2, 0x2) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000300)=[0x1]) semtimedop(r5, &(0x7f0000000340)=[{0x0, 0x400, 0x1000}, {0x1, 0x8, 0x1000}, {0x3, 0x6, 0x3c00}, {0x3, 0x0, 0x1000}, {0x830e8804f2b7be12, 0x1f}, {0x2, 0xd472, 0x400}], 0x6, &(0x7f0000000380)={0x0, 0x1c9c380}) semctl$SEM_INFO(r5, 0xbef0a1f6f5e84798, 0x13, &(0x7f0000000140)=""/94) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x400000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r6, 0x400448c9, &(0x7f0000000080)={{0x1f, 0x0, 0x4, 0x1f, 0x9, 0xfc}, 0xc71}) r7 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r8, 0x10, 0x0, 0x200) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x3) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) setsockopt$bt_BT_RCVMTU(r10, 0x112, 0xd, &(0x7f00000000c0)=0x401, 0x2) 13:33:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc0b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:19 executing program 2 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1394.971408][T22318] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:19 executing program 1: ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) [ 1394.998782][T22318] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1395.042462][T22318] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1395.073102][T22325] IPVS: ftp: loaded support on port[0] = 21 13:33:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000080)=""/169) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000140)="3e101bcff1023a5ad83fa760f8635a7ffde8f40cbdc427980e8c1d7c6c272c3f816f5838b424192d5fc86d64b8aaf8d220888fa55c139a700713ddd116002797df03654da5969ed766971202f2409a28ddc4211874423a3baeb81c681fc6065246c8cd4aeb8158ec81f337108083877b110e6a2926e3acb929bc4abca26ac83aa793ff0c047acb97f3a75b4badc4403056bb29c12648934fbe1e5d63baf83b5c6dcc47465aebf3ef0d3aecfb16af518ec11bd32c1edf61eaa896090cb40a7a40", 0xc0) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r6, 0x10, 0x0, 0x200) [ 1395.195254][T22326] FAULT_INJECTION: forcing a failure. [ 1395.195254][T22326] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.257923][T22326] CPU: 0 PID: 22326 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1395.266644][T22326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.276761][T22326] Call Trace: [ 1395.280069][T22326] dump_stack+0x11d/0x181 [ 1395.284468][T22326] should_fail.cold+0xa/0x1a [ 1395.289262][T22326] __should_failslab+0xee/0x130 [ 1395.294161][T22326] should_failslab+0x9/0x14 [ 1395.299324][T22326] __kmalloc+0x53/0x690 [ 1395.303504][T22326] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1395.309531][T22326] ? __do_sys_bpf+0x1f41/0x3150 [ 1395.314508][T22326] __do_sys_bpf+0x1f41/0x3150 [ 1395.319203][T22326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1395.325552][T22326] __x64_sys_bpf+0x4c/0x60 [ 1395.330028][T22326] do_syscall_64+0xcc/0x3a0 [ 1395.334631][T22326] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1395.340531][T22326] RIP: 0033:0x45a919 [ 1395.344451][T22326] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1395.364078][T22326] RSP: 002b:00007fae97952c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1395.373147][T22326] RAX: ffffffffffffffda RBX: 00007fae97952c90 RCX: 000000000045a919 [ 1395.381129][T22326] RDX: 0000000000000018 RSI: 0000000020000140 RDI: 0000000000000015 [ 1395.389138][T22326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1395.397123][T22326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fae979536d4 [ 1395.405997][T22326] R13: 00000000004ce158 R14: 00000000004d4a78 R15: 0000000000000005 13:33:19 executing program 1: ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) 13:33:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='\x00\x00\x00\x00\x00\x01\x00', 0x18c423, 0x0) fallocate(r2, 0x10, 0x0, 0x200) connect$caif(r1, &(0x7f0000000080)=@util={0x25, "5e65013f52fd391c02fa54b65d37723b"}, 0x18) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dsp\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r11, r11) accept$inet6(r11, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r6, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r8}, {0x8, 0x1, r10}]}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r1}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x40000000) setsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000000)=0x7, 0x4) [ 1396.132103][T22325] IPVS: ftp: loaded support on port[0] = 21 [ 1396.428204][ T9713] tipc: TX() has been purged, node left! [ 1396.588198][ T9713] tipc: TX() has been purged, node left! [ 1396.768187][ T9713] tipc: TX() has been purged, node left! 13:33:22 executing program 5: clone(0x1000000000011, &(0x7f0000000800), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x4, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x1, 0x1ff}) 13:33:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc1b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:22 executing program 1: ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) 13:33:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) sendmsg$nl_netfilter(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000080)={&(0x7f0000001840)={0x2284, 0x2, 0xb, 0x2, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x4}, [@nested={0x1004, 0x41, [@generic="5971c7b3cd2a6129834957444e62e963315ee1f67c80823ce4d6aca3010f0531685aea72e4926b7eb2f21d9840aaf2876a71d4c079efb20c61f06b1ee481e088855895d9e6c3cc3ac97128f731dbd26d42ff8139a2c2645bf97bc19e744d1161adbcf87e386979d463ea74f2a517b0ed7883be835cb4e9f3970011ef88e699ab5acffb99522a1a6f8adeb03f288fb1037708c2be5e71136702a689e0d5725fb8395427d7ddd4ccd8afc0cc54df49abb3b127aef944f6fc9296d3affc6442bd70cc9948f1fdb86d55dd4176ae5714c1cb579718c058380f6372ffa2de3056ee256a797581b99e715b7700ada73ad91c0eac4f5e04cf1c4e8639add41634d6b7423fc5c994bf3991ec7de9b8849141b785674ac622209a75138ff63967a20b16a8ead0ddc548a807de562eb89d92211de5ba96c6bdcb5f7fe58e5ee3acb90ddf5aa0ed6530d8f16995d317e45289496968ee74cfa2e5801b860f5b7c63c2fc433995a7505b011961e84e16177d3cabd2756e44315ce517ca928347c1a2c8b97ac1885a79856631359c84c5726b1f84cc3832ba8f88970c982187652b5d2752e7f1c53c4d9f5c8954a2b97efc56144b67f51a6059dd4a0b6b28d7df6917c58abba285e30af7bb80ecb919b05d16e8f298897c535ceff0514b5db8f6204e1f88cfd68ae4a90867680dba29a7eb77b3cd727dd2cf7ce42e59e65cb74246e6a8d196be4a607bd250de47f1405de55d46034249e879cb88890db2e7f4616fdfb009c57a6aa4d4979da2ee27dba27ce5a92e38c9b2efb7c763871983040628584dc6857a54ff483c14a2b888eda3f19daa471e90b7af677863c132ebd3de92fcb07f8ac2d9b5289dcd47aa9ed0669fcac5ac5f7598779dccdc845646bffab9198c42dc3acf59b716ee50957c85a0e0014cba41e4335c1af374183d968cf0e457ecff0c5190c793764b64476293b05c5d39fabf2af14776f061c1e44d1d7b1c71a426ad15b213df9246c4e0ce124bd10f2e75783425436767aca57383ba2b9fe5fd819df25977ecaf1a0ac0d53b683549ddd18b47df4ca3087a7acf1060b387c1e91285abd1faa65ab8fa31961c83972530548448e5f85ac0c84c70dec5ef5949a003730ee3306bc840f6638f286b0fc6f372d51d1283642ccfac0561267e81ac3c9854a34327707166d4e39084b2ad63326ad431cab30418586329f135c1b92674618a5e56804426b2f4adb0d58c63233e6805f10c9fd84837435a399509ce42d6db544945753de675e363ac7577984c3aaa2896d1951782756e3624db684c990e2b15e1d2998df2e4ddae10ae71426ea05567fac65f6a78f667ea56bd10141f597d3455d241a2770ac3aa336335f9591c779b1b59e370c4a910566316d3ed9ac8a936018e9fc8ce98e141f8492c96bf6ac9bad0ace9ff84bcb22c483b67c65d9cc5c251842cec0092ce1c898e5d099c0d5008a00c2ad7f16524220875859b5cafebf60a2bf0f01640b4058a8e2206413c388def61401f5b1a8c531b8649ba2f4fc3495f02bc8ccb94dd672f0812f5347aae152672bf0c9eca4c309ad3ca995634c8281f92468554f6a055694f1a1f0029b6aa72d72109cd3364dba111456b132d03e27095e03775eb266a35dc11ef77700ea50639fc3ca16e8e6667b29ed0e612c0247d951ad22b252ef723c7cc06f6e12dbccd913911f0b317c982ef406df3ed2b1841b0effc38c0a105babd5ddad9cbb8f2cccd700d7efb600a6a2d1d4e859cf8b16b7511f95f153f8ddb03f7d53a55098d6a5da9923ce7d678cde82d8383be761b4a97405f4be80314c0f997c5ff575bf0b498fa1d4ec1761b3904aaceaec2ba65bab4ecbd1eb546f335544795cad128201c4d93579cbbb337c0b52e0803c3da2be7674eef3a66db618f83bc929800da0b28aca5c4064663edc7e290d3de47005ae621191ac499fbe24d1d6aefc9aab9100d17ed064ea0677e1a58a864bf049dc58ea243ea4ac497f4030c210b5f860221f4f3fa0d0622f08791b45dbd2c10c4b2e92ea96da376511eea1960010350e7f1ee3199322b8e4e1f2de581f37a576b8b124dd560c4e461c79f0e5264ab5bf31d24e18937347b1adb9bc48c9fb0b5200237410b5682615f0c7fe1c669892fc48f83018c936fcd4b6368445090e4656bea6003eb9b771a96e7263f2a9c24d92671e1aa02b856b2d25ad2d00db71e7c8bb1c2f63a7227116caa7f6ffe04eb255dd6bf9e24b0662e0ca9090942e25d730829aebb1662f07efcab80ec4ced72cd7daad8d066d3acec93239cf749192e5dc32c905598a557d462ed7b25ec2ce02f4fa16711f90a80e9bc0458d3b9c79eb4a0c33cfe07034602a6f10d3c5feaa1f8918d26cec29e04d618b27a4cc6505b23d06223b17fc6a1e3891f90a3a99238db25eb24a83a4837efa7ebf1b5b2b636cb78068434b7ee28cbe3b76f4705811c3102dd633456a29428c003d8e47a6691af3e63b30518fe235ae550b7acb3030fbf5b273c347eacc510c8c6bf1db2ac7c495442259dd3b8b99dc56f2b354b47711221387c9915dc4f8ee318d667ac1e8950f16722d0a73a79f8b88d182fabe783d76f587f3203b86e871bd6d89cbd83a0e4d7c94bd19883c6a5bce8ad01df7c3767017287574d5349c6f6ca94ae70d0abe9e8c7421830b2bbaf01531c34bc49718a4e77c48b72e767cdf09cf226f39bef9a950a5553ce17bfc6dcf2599f688499c7d4bc11d055a4befa3a67a73b4562ad7b2479f475befc04e037a73537df5e50352ff80ec975850c05d15102207688d938350b0c3dc3ffe233d2f4095ba47b60efdc861e713b058f904afe1017acc486baf6917fa61ea1662b1cc410f9f0d9ec94d13356ad121e2113e27705156adf13d4724455e5a22222162fb3df1f1eb5fd643b4273bfcffe4607bdf255ac28c59fdd9e348551f9d9c1b056832728cc58797c6d1648ab08dbb693d35451a4cf5c9da3daa69a8a89861acd939bb89e0546b364735acad76507511209252cfe91c3e1a251617672f3c46ddfad1c09bf4a95a9d15ac97245d186658e0ad4242aebdbc6fd3b116efffd9af8d378700bf02adfc04d7055a87a033545cb70e5fc9b81c5f7a1f0837727324622bba6ba53f428b72f2a26fc495b486ae99803d49f7f510dbc1362bf4ea76ecc596ef34c76ef4d57b829da9c1d054743e89e382ac7c323433001b31985267481073581573a6f014dbd17471d5f424523777fdd9711d6494bfdbcf6f4e4d574b402aa33721aaea8a2ba39bf96ed902ed911c902206892d65581766bc0772aadf8c92abf2c395a2e45f7a2ba0168dcf48d0181b32e67a18e5d08b7df211b60aa2b369ce48b0005a8df1cf9cb16db18364f97e39452b86b4a829007a799f79d8f1ea41681345a774503d503dacefb8b4e425351f88384b6ddd4e59b397d9a1a7f4a7e1e1b2204d0116fb23555bb4472b76c2114aa500cc974cac39716bc2640fecada02b31ee7db17b92cf91477dbc57a7c0c18863a69c4c4d4a117f26815790d031aebeb20085cc8c2980b8b264ac18ed59a4a0be5726a8a3cf24e332fefec1c070ac49091ca3047bc0a05bec4eadbca337c429d299280d2aec9e1903b921e3f4a03af2613cef0359a812cb505bd595a80bad3fc3693913782dbf045ccd4b18f100de4be0b7c0d0d37445efd8931b22f3c881428d043e61fb4ffed333aa8877d5bb91e46c328587b7bf2d9ea36cf2e7fcc3f1813e9a06ae4bbb38e3e21fc7d3a5965c6977372d72048e6cb4a1a58c79bd6266108d7e0833de4e07337601ff5640ff3a9d41fac500f565053b18129a2f635de52726cc7d32caf128cdcef45cef8d23ab5b063ee120f272f37f2e0938c474fdce427e01c789ef95c7e5a8ae9ce8ae85cba3590f9b35a6ea5fbe164aee600729225bf104af4378fc0d41df925485b87a913ba16d59c494a8a62a4dcaaf32162d37baa8d2c4cf63f5dfa8836eb1d21edef22fcf01dbb3802d9efdeda96db8828e20783c69220fef2ade3ec04ac2c26b4efad207225e0e9efabb58c62d21cf577af450f86ce9f503e38f87782b0a63437720a6b633f4534ddcb460a937ceeaaf5da96b6579a72a37838e8cece0b43e38276728b2e98490d9ff473242bb12a574c2367e7ff06482ca2be518bc24506bf6501e58d42310fc935869b75a03d14836591a6d83bc03bae170e3074cde2d3ce2cd1c3dd72716fb348a8dea2b7087b1d90b5ce0868ce3994a02fd6d0e97d23aaec665d198158617c74fc364c55153810dd39543eb947d6873f0ade797b7e2d317f91ad48c3e05c63eac4168f616bddb57c9c5463c7df49670de2a01ecb1ca8bdfc648799916843052238727163fb66992e05755d66b5e28fd919cb58f354a4dfa313ce288c235be296fe390936c53a02c1fffa9392ddb01ddb3edfe57c4eef23003c40d6d9b6155b5a43f7bc625d7adab0790f33fee312f4febe5c829db1bb39aea401a98548d00c24a5eeee8b2866c39e5673a91fbfcfcbe9903a40f9dd403b6431e173640d147f7100bbdabd75754347792ab6d12951c3c822b9d51e27ba6f3c84d76a00933cb7a0f0f86743fc629f0d45e4ac7edd562b67d7e6ff9f3443d583574c427a40ef817a6b79f128b019fad14d6f35fa0596455de734976c4a7a4804870d73ea0a562dd892bc60a21e74630fd2031a0f970c0b7676a005d43064afef314cb752daef719644d481b25764f89ae08b67b50a073d61a192fd5b32854ef6e83b0656190f5134d4fb2f06da551771c8d3de72805aeaa36b1b322f7f20c2abd4b911682f27fba73de2bb8f706f51f67be6cd0226ac54b955cc2da77f7e67c9d3760051b91b14cded9c3718783ae41bb627c83ca546c3ba0891f29ab84f1ab34c76e6ce00a8bf769f1d9c1215d2b8eaa9406842035d52b869783e8a63a9adb651e48df6175d2e8f0f2d4d520cd2af4ad23a2f057337b5f089bec77286dfe41680d11245c7eaf620dafc12b0ca8b90f8eb3e4c48c36d9140cbf73c362f707efcb6dbb16709cecbccf95dd4d480cee0d9aa5f493426b86d3b0907894376eca134d2af758c7e4a55b45419580e504df564bd39b5868b6f8fa06c14beffd601515ef7f90dbf16877b3998eee813944263874a26f44d2da14f5b134e76ae340bd5a81f1097bfcfe444afb9fa7d9e0c349d5e003881f0b29635dd485cadd8382d6bb67e147735462ccf8c2cc72f290d19ad6d3f30dcb63348f42e9946908cbd57ddf8eadeb3eb9888ddc1f312c8b8d5ba1119addf09c37e1d83fe568499eb0138d2f42a7f1a1e575fb796af25da9b053d5a26c685e371080c5bedeb91cafe0e4581534b7cbf77d57f5c5ade774af0d84a7d3a8929f0d21592d3865a1af5eff105f0c1d95ea3595c42df92fba6b4b1ab72b8f8266daddab8cc96ed86ce7bfb8ff00a64b1155fdd70dd595d34704b86a516fae7197f2d52e3a9b22d9a54b88d5225d14cb100b4f5750deafb1a5e3d6f18d1d29fcd2df312555ce4636e305b338ddc47ea95be11ffa35a79e21874f09523971ba7ab391f2fccdb5bbb4fbfcead03bc24cfaab78a5ce0232d79b2c90f043d30c74c42e5c9823d838d711f292261af5b0f95a84587f6c6857dc929c94d6ae1d4c9a5cbc8513446832b48dd264148d99766e6d3be4739eb7ac5c1e01114095b532f4ddbf78241cbac190d62ddcd591a6d072e9dc7d69c8d1dd9498a23aa4338f261377b13b965be993a64ecd1120240f3fecab16ff7f07bd40972a3f62d0ac2aaf0990241a0a6b6aefb480a3931185a"]}, @nested={0x18, 0x3b, [@typed={0x14, 0x2d, @ipv6=@empty}]}, @generic="1525cde21bfce3d1658a2c7ab82cc4f53dd9ca8c29ad058318e21dbc8bfd487762064db5f356946cdf97cd897a7f94fce12028ddc14204dc016db6f149dff237b7109683e9a1b76682c4cced5621c59e7a218fafd5a8ce1ffaf821e2095f3d16cb70c39a8d70c8e5068e8ebf454fa5e009b9bd2660073db7a412e35abb9d92b59715e19018a0778275b67ce8b6628820198a32e5435ac54e7c77f5661e55affad020570d1e8dea4d37c70aad62522dc96d9a3945d49206db73c7db465e7a7d0ae4824b73901aaf689a16ea4b152ffe52ed9b5a", @typed={0x8, 0x6f, @str='v@\x00'}, @generic="959f1a191d60f8066e45aa6ee5d53756b57fef8fc0256bd094d44738e5d12fce4e9285595f57f0527180ac5a66ecbc1ce3c4b6a3a8fed987116024a71e9df68809a4f7", @generic="a4ba4299495ca80740de978ff3f6275a4dc8780eaeac3c3e93cc0bd26807a9bc6215106ecaf434275d7c7cace56d8473a8482c4f2a048e352044cb44d2e2bd54b323b56cddf8cbe0e0b7d92d5bec3962fb3cee1c2c56bb", @generic="d70b36c2958340b80098bc7bc1fd05738fe9f019406ded395a5b4ca411950bd4c0f4d9e35b9ca471726a786727fd9fe3dccb18be9dd0ed6bf603107a95347af56173016e7423e7b183d8c460e40711df7d039e41cee069c6abf26acc8dc631ba451bbe88b7a8ac091e41dcc6f01539b1fa2c636935182f02df11976af1420f4e6ca5920c35bb4a7fce2823dd0be1489cfeafcba98ee98421927bb764c71d31a273125fc77e467e4f2257669d35459d666edbd3561eb0a1f2d4bd06357d4ebddb069c505de36a50553369e32fe04a2d9dfa872f84b5caec2dccb0913c47f4a43c8ba6fcd2828ea0f3c668c8aa38ca9c109c639693a8f113d6ed5618391eda6ffe1b69e6fb50efa9f7f12ae3a4ab9dde5edc76467a1b4032a085d8419edecb592e53fa07e8e575bedced698bcf5793c0214a4e702737068bcef7c8cef9916c69ce672e61d8191d09ed2c7251838e789c0c7314898a5826a191d9d5f31adc6bbfe32606b6ca55aa6fdd31b91911a1d4b81122cf52d6b7195e690189cbc8a8aeb1522650874d351efff38f087c9ea96b3c5f5501955be2a1dcbe1930ed5fa10c23334f90e2e1452e79e36d18db437b82a3f058d91a53d53ffb0d69cb60265fee2b50a749a7f228636dbea578477d2f1ef4bd426bf7be9e5cee5b0664c97bfebd109970eee18cb0e298dd63d978e50d458b0d38c23713d6f567087aaf67a51cb4937f2901c6112c035009948a2330e08622511277c5ee3f98b07c8ddc17c2ec6285f606e48c877b9ced4a7666b7d5c58b22859da5be3abe04e831ccd5f90e95fa96bd6b4b100f199ff7e1dcb3083dcf547dd4a64e48eee09568c6b40345be1a42357417aad71e0d99dfa22a9551b417e1df4fcc171ff63743e3c9397d5d2ba6aca87905fbb2ae735c8bd1d37af1f2c647918e1d3f0f251e228af6f69f8211d223609dd2566f097fc9535f97de91d267b3eba137eed1b0c2aef425d5d7e4680aad3ce80b1761d1fc8148194e4692513b99a0267c0ab3dc0a58654dd03ce239c03e6d6162d5772c7ae8dbbd832942d55c47590e493c97707635042a591a3e40033fe8fe20988ab6595544895fe14c9debba1b015afc58e4c2cdf524c69abfa07f9e6229ed62d5a8588feee3e5700cf70c1aff7f7d3669425267cab9fa08a2ffc969c8ae2c9a7840c85ff7ae99947f32d9310b322102dfb8012d76e538f5ed27173e52983d8c4a98dd8a8c59f097a7f05cf8a112eb5e25f25f3f39647a6b33308070103249d4ff056cf51fd133c44db4bf66cef3c77623e9b4fe2a8299a174825f2f16f8bc7f182842280fb769472311896f30d3b15be0c82f215b2c358bf86d3e269612a7edb8275a318c26dfefe9863dc2be5fb75eee19eb5aeb4aa3190f3affedecc6760458e8fb0a4bf4554cdb8ca5fc9dc262f83159ce56a7f4ee7189e3e1807ba89e2b1ddc9ef0187243345eb9c3a62f41d73aec60f55463ad55bf07ac8c160ac34b01ee8047308c9b9d0e17efbf745ca494e521730547eaf548afeb0bb41cb4706d5ec21925ea452d9373eeb0455476017163ad4e353067725d013a9ce76cb13434e7140bbc51370b6f5b26cead3a906410037b89318e061a3607599453e1eea8f778e6a08f4d8ab0cb3240f8bba2f6add8070ebe095426eba62cd3e2af56233a3ed8863d89abe00736a2df43d6dc04bc47056ef8bdabeec3baae063d54bfe4487e887aee610fc385c286400f4f1e766229c7e4f06a3dfbc5a33c1b8f33e53bc35a6a0c6176762cbec5940cd682907b0a068629760a85004294d85daeb005997018d201b12321b53fd27f44f096cd22b29670dbdf8b9315ed4a289c6866ff8e3b59390ce8e13e6eb1f4e71143452c3d86cdfedef8d8ad7d5cd88048d82e2cd5be790b129b5be0056e1e8a8548520e2afdac04ce384e29149e48d1b4f1f02e539799fb1906a37ab9c753aa9f2556026e0b318ccbd6d8b276fea52ffca66c10647ec7e5acd3192071eb8b42ff65af53606bde60bb3808590785b86e310a62845122475048d71e0003c080255fac14ba89443d1e91876a009018fc23c9f78228754249919d4b824a05df5b629f6235f6d2d0a6a37bda2e9b733df0f5b7c07f5f51c03628cc51e68a0f2f8af0f1daf601d903397d53c060a1f9c56039176b05988938891eaf6c9e1a3c6a89b7e9e71de0d94bccf99a31d27e4eeacacaed82172cdfc9a04f97361118b9f4dd33aed92a255f46994753f743cc8811cb0322103132f3b38b26e6d90224a2d2a8b30cedd4ccef38b7ab64e0f103d5f3e0a86e66c9ceb6c929c9e16d29669c57d2a68b7797206f2bd2865b0e5a06280e875b562b3c60c5b90d1f0d1306644d140cbd1ebc1ac8b4f863e858b11b0415b99b774eb38263c3cecaa179e0234e879bf8a61f775fd985c286f49f7e07867260c2bac14619c5efbd2c51294ed9a20b007423f17732128d8645c51bcfda88653be6b4f6f244249ec9498d430a28b84c3f6f31ee7263760c29c845e7d6a60d75b55b5dd3a1311a3c18dcc0bbdd6b40a82f68407ded480a55d03ef7176c178ddef7188ff53ea7022857d447e7fc40950410710bda3ca18e8f0991854002740ddd5d31f9c2e1bf66e8b9b0a5a9c96d6f8b4ea6d7d9a4a0ad3cfa3ab49cf15e036637ab0561bcf36e3c070ab85c8802a742a87324990434eb804d3905a96c013f54e67f6f0ef277255bc865de6e3d4cc8b81cf6989f9c5779e793b7eb18e5c183c1269455954ce8f0872e037684b4912072344420bfa0c2ac616fd299dac70a37eccf6dac970fa5b2701ebea0fb43f8c14ec60b61df184987d1204af72702004fa0b12f70c95e879690546bf19834ef4b74f07ee61aa645a5907d2904c64c642f3d04ada13b50f6b598547a101c05d6a9cdf5dbbb0ae85bba5f79366e4725ddfc58a5523238ff16be4c9f62db4399b71c6d3959b7f22b3479d3cffa4f211598b4d2f50628cc5a9bf24ec6315ed6268c833c684e23d3b9e3996a22370466096a6635ec87bd43df3d29e6c618e9203b0b9b6df0ef95ec7f9dccba0801a5ea2e0651920d7361a7b13114b5219dd03bbb85ba3432192e493917d66cf40fb8d5b20ad5da842018a8d0cf4b2d72b99ec51b0a645669d9a1426a18d8293ed9685776b7661452dcb287896e78758a39b406032da68fbf76f8232f2f15de42a51aae554920cfd521628c1c780f40de40570b2e674e63ad6f4d2ce4263c8ef43cc4a2b43804050f67cc9a9c0909735b1fa3e4e99aebca36abcc199a297c771f49198e238b490a8fb09d0123ad4a788bca60bc20c8e9fdccc843a96a11a34491647daa1d221c5854ee50aa364fd3431d5d3e5a4acee4f34226f59b30d0a81c160b18347c33013898c521c405d320b147e3f2e1d24912969d2d04aa8ce993fa24be305638c9e9928680e4d39482c5248f4fe9a12bc30a6204184d9e483fc11d47a6ddd3afc86317652bdc0f09a0008f1c9ab88243219623805cf9bc497d0b456727568f241f709b016e3a5d35d854df33f736f05a1df90f887775b7bb75efc6af90e3210742828c0f2f85eb9a558bdd43211357fb1e023dc66ec0fee49560a2f8ca583dcdb22874f802049a15d5ae6b926ac17833d4aa384a30276d5c496a7946f4f96aee2187bb38e343dcbe4d9a9b35bf455c87e5d90f15f190b54aab7f6bc283f263bd70689a2c3d91a13101a2f7b082fdb19969970dd63a08f6f0dbe0506c21238bbe790ce9a1e3624692e568fd9726281d0b2601f71453cf0a20bf3299e8b52a18bfcfa2b7e8d06503c14a36325cff02c90e553622eb3d7210070d55951fdf71fe3ae096ff682ce4a73a3b8d884fa57d045f3305cb6589fe95f3a20b23c72001c2ecaa5782ab3d9fd9fa7363d15e5148929abf8c608b975bbafa02935de1d8e264f7abb00682e91e26e8d02a10647fcb9fa6c276b4a53d78be0371c17fedfbf6c562d1f8875dde1791cd2fc3d25c969074473108914e99446fb2edfeed44fac237309ae9fd14fcb7b0dbd5bff5b2fafafc9895b047313106720bd32bdd404f6e9aa6a8b5af31777dac2d5aec5dab198e20ca0bd415097a6a76c86d8f96347525b1ea9e6fa774a3d4a5fff94f3b6f10060d26aa4442946dfcfc700e5c8747b0b54ca9543091a7b154f3b86b38bd6449724be0a8cc6f802b79cf15648fc797daaa20ec2aae8a103ce8a960db5072f25e39bbcd1fd4d8265ec81477e358a39467d9fa37616c9d90874e046813545206b902d30cff40f5b0b0e82cc38d6e87908ea7805b845112e06f6aef3cc02622acca7a0d27010db41fcf876766aaee71b741527b6809dadcdf814d815f0300de1aa67d39e7f8f578e3579b610fd9752bfab226b493b7cd0a0088f67a4807cd32e57aea1c5529a971748ab37326cb9b6e85961b023f1a21c076b61ca1c796b16efe53a76ab8a9e57b1ef17662428efce42804565cd2f380cc180e15804b77d82201f6ed598694d6bad79c1030ee6a72952f697af52ead657c25d84abb4a0aa992478c0d3d318364458238669f9e37d6fa4056ac2fbb4943f8ac12cdabd1b75c3f4a958b4489843884c41932d885402cbd9415e9f835d90875bc88a45bf9e0e0efcabc85e420395880f060926fc39aad3d0831d2c1a2aeb728c515b4a976f9c0ca879258b5d692a63d50537f72fd925546011ec9b5eebe0176e10376c2a3f3323d173445b2af6dd44066de1641246a27c8ff1c686ae43f7ba1b6833196d572abd37c4245c0731f1858a25c43f17cdb64ae0bc7dfe1c705302c5a93b19c4350db00ee5135c1c4b6cfc7feef751f1288169e6af4190a3bb130425a358244910560597bb8789e8ddb85ce655d7dc76d4a641d1cc32d1ef36f92ebb68e4dec05ad5f258f2a66138adff596ad2c4a568f75e7eae2b527b4e5e63295bd00e494f98b958214cf77763b8f5f4c7317889518604e91b56f4775e2f92bac2899be32d1d47c9bcd9a230fa2791c9de3b9851469566828a080092f3951ca003145544adafb5811867b7cb36a6f1e37543fe5c90e06c158a432b244e0841cb77938fce04d4e0548a43bd996d4c29628d4a917eea5fc97c6a5f02f7d131b0b65c8b4e27f5479bd2e8101f0746924342b519eaff42343fa3b6224c2a045c432f9c70c4c7fb2a3fe117986d507e3d4b94ffbe2fb174632c2934140cc9dcb9f92ae484c71d42313663144e82e01033129139af597911d06315a0ca16c0b555ae686575cd7c6cf3b7c499807df83489de007766a0273b7a11ce5bbab2da52eab9f6b4dcace11ed40e4e53d8a1fe05dca62518633622722f66fbd866b2b4a6abb5b775b8897d30df1835087a2c8cd0ab9b3024838caac9c446aac05489051bd08f641752d75cf1f13e8afb5aebd3ab29d964d3897e5f381b1f6986832aa37fcad68ca4921eab6816b460ced30773cc81909e1d1ac1182207a0b995d8d330e6fdd3753b0790511cf86eb61832bd54fb76c9bfcc55a23a61902b7c65f54c39223214dfa41054826eee40e82cdbada9933ec02834c477f4a1108eaff2f423bc3c5e54b9b5372a49f0b796fd9c887f37b0b9fdff98c5f8d963f4adb654ead5312407ed2df97cb8b6c04c8daad9d5162df2b6eb388e29a4e54a133ea881077e9a78978c93b9b270646c393a20a36f16df15cfd729e5bc2e9e19a04df4eda57945b918e0dbc870977f42d834feb76ff09b926ef8ac1d4d950051e710f9f13b5c0bc3d9da46a919525d05afc69fad66b5b1a30b29ea46ebf83044407fdcb65dc62a221e533544d1d2cdf7e16340a67", @nested={0xd4, 0x7e, [@generic="b527a95f9375ce05ff660d540ee3326cbe90f35b7fca71e468ab92ff3349cc413777279c774285c594f5e5bd55ac19516af76d4b4f7a8aa6e06e48aaf183f1168ba2399ae3131b2113a700e6a908c1d952b80cd383d77d18d8b471a2abb3c6d238d5462d434f34140330280878ffa28249594dfdab8727dcc29002a1dd3bca961c0f061e6cd249b69c31482579037c3a356188883b85dfd7baa55922c55afbf840e736c7486a75fb36ad9689804e670568d53a365d20c4e173265695b69b5c1a750dbb59df", @typed={0x8, 0x66, @pid=r6}]}, @typed={0x8, 0x4f, @uid=0xee01}]}, 0x2284}, 0x1, 0x0, 0x0, 0x40000}, 0x20004004) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$FS_IOC_GETFSLABEL(r10, 0x81009431, &(0x7f0000000100)) fallocate(r7, 0x10, 0x0, 0x200) 13:33:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x8}, 0x2a0}) [ 1398.098837][T22366] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1398.116133][T22366] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1398.124348][T22371] IPVS: ftp: loaded support on port[0] = 21 13:33:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1398.144447][T22366] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) pidfd_send_signal(r4, 0x19, &(0x7f0000000080)={0x3a, 0x6, 0x889}, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000100)=""/254) fallocate(r3, 0x10, 0x0, 0x200) 13:33:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc2b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000100)={0x3, 'bpq0\x00', {0x2}, 0x8}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x4, @remote, 0x9}, {0xa, 0x4e24, 0x3, @remote, 0xc00000}, 0x2, [0x8, 0x6, 0x8, 0x1, 0x6, 0x86, 0x200, 0x90]}, 0x5c) 13:33:23 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x80, 0x6}, 0xfffe, 0xfd}, 0xe) mmap(&(0x7f0000017000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe5, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000200)=0xf, 0x800) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x18b040, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r6 = open(0x0, 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) r7 = open(0x0, 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x305) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, &(0x7f0000000300)=ANY=[], 0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) 13:33:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1398.868726][T22404] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1398.882744][T22404] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f0000000080)) [ 1398.912144][T22404] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:23 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) [ 1399.167472][ T27] audit: type=1804 audit(1577626403.491:192): pid=22416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.240460][ T9713] tipc: TX() has been purged, node left! [ 1399.311650][ T27] audit: type=1804 audit(1577626403.551:193): pid=22425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.408315][ T9713] tipc: TX() has been purged, node left! [ 1399.423190][T22371] IPVS: ftp: loaded support on port[0] = 21 [ 1399.438793][ T27] audit: type=1804 audit(1577626403.601:194): pid=22412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.569087][ T27] audit: type=1804 audit(1577626403.901:195): pid=22412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.690229][ T27] audit: type=1804 audit(1577626403.941:196): pid=22412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.775116][ T27] audit: type=1804 audit(1577626404.011:197): pid=22416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.803258][ T27] audit: type=1804 audit(1577626404.071:198): pid=22412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 [ 1399.834955][ T27] audit: type=1804 audit(1577626404.101:199): pid=22412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1627/bus" dev="sda1" ino=17453 res=1 13:33:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xa}, 0x2a0}) 13:33:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STOP(r5, 0x54a1) r6 = fcntl$dupfd(r2, 0x0, r3) r7 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x4, 0x500800) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:sysfs_t:s0\x00', 0x1d, 0x2) setsockopt$bt_BT_FLUSHABLE(r7, 0x112, 0x8, &(0x7f0000000380)=0x9, 0x4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f0000000200)={0xc, @win={{0x9, 0x1, 0x95}, 0x9, 0x0, &(0x7f00000000c0)={{0x6, 0x40, 0x7f, 0x6}, &(0x7f0000000080)={{0x1, 0x6dfa, 0xe9ed, 0xfffffff8}, &(0x7f00000004c0)={{0x1000, 0x800, 0x6, 0x83}}}}, 0xf8c, &(0x7f0000000100)="b8e476d71bf7df92ee8c9da207d2c35a5a135c734cc3db944e8fd762325a41b5d8488e19695522c497b3010bcfc51c37b54ef7ad9a44dc4fb7390e487f0ccc4dc4ed1797c0395f44b9e4805d049f82f3868617754d5d04b376c0ca559e18a5066689154963d394836bd4c81272c3aa914d97891600e6e04c25f98cb89015400428ec64bf0e88855bd6c0065a600c641730a4a9e13cac9878a4f220eb19bb58e7c9317e6dffd9d4ee6c57f83ff95c4125b06a59758c1e3a0890bbd06d8be2fff2773f5a7ce3c08287fb901866bb", 0x20}}) r8 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xfaeb0fac03223169, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r9, 0x8010500d, &(0x7f0000000540)) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r10, 0x10, 0x0, 0x200) 13:33:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc3b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:25 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) 13:33:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000400)='ntfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_yes='disable_sparse=yes'}, {@dmask={'dmask'}}, {@uid={'uid'}}, {@errors_recover='errors=recover'}, {@show_sys_files_no='show_sys_files=no'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@fmask={'fmask'}}]}) 13:33:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x5, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) fcntl$dupfd(r4, 0x406, r6) [ 1401.386517][T22467] IPVS: ftp: loaded support on port[0] = 21 [ 1401.418653][T22462] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:25 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x80489439, &(0x7f0000000040)) [ 1401.457313][T22462] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendto(r4, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) [ 1401.561855][T22462] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, 0x0) [ 1401.689885][ T9713] tipc: TX() has been purged, node left! [ 1401.712153][ T9713] tipc: TX() has been purged, node left! [ 1402.194183][T22467] IPVS: ftp: loaded support on port[0] = 21 13:33:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, 0x0) 13:33:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x6, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) 13:33:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x3, 'dummy0\x00', {0x5}, 0x4}) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0xffffffffffff8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55", 0x3f, 0xe, 0x0, 0x0) 13:33:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x48}, 0x2a0}) 13:33:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc4030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1402.481972][T22519] IPVS: ftp: loaded support on port[0] = 21 13:33:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, 0x0) [ 1402.568806][T22520] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1402.588462][T22520] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x7, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1402.691738][T22520] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:27 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x402, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f00000002c0)={0x101, 0x0, 0x4, 0x0, 0x5, {}, {0x2, 0x1, 0x0, 0x1f, 0x4, 0x80, "e5cb735d"}, 0x1, 0x4, @userptr=0x3, 0x8, 0x0, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x10000) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40080100}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x1c, r10, 0x200, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="080026bd7000fedbdf25050000000c00040000000000000000000c0005000000000000000000080001000000000008000100000000001c00070008000100", @ANYRES32=r4, @ANYBLOB="08000112885d86b54baf", @ANYRES32=r7, @ANYBLOB='\b\x00\t\x00', @ANYRES32=r9, @ANYBLOB="0c0008000400000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x828}, 0x0) mlockall(0x1) clock_gettime(0x0, &(0x7f0000000280)) lookup_dcookie(0x1, &(0x7f0000000140)=""/9, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r11, 0x1, 0x0, 0x0, &(0x7f0000000180)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r12 = creat(&(0x7f0000000480)='./file0\x00', 0xab364308327e12a2) setsockopt$inet_tcp_int(r12, 0x6, 0x7, 0x0, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:33:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) fallocate(r3, 0x10, 0x0, 0x200) 13:33:27 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x8, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc4b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = creat(&(0x7f0000000400)='./file0\x00', 0x1) ioctl$PIO_FONT(r8, 0x4b61, &(0x7f0000000440)="e59ca36e306ccef1cde72587206447e5c18be3249ba94f3c4e4fe9f51f7426a8736160b0b71d3c61a232e0bbe27725db3ec45e27b71824b7ffddd3b996a6b1df195436c72df7d4101c") ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$TIOCSRS485(r7, 0x542f, &(0x7f00000003c0)={0x50, 0x6, 0xcb5}) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="08020000", @ANYRES16=r4, @ANYBLOB="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"/514], 0x208}, 0x1, 0x0, 0x0, 0x40000802}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x0, 0x0) fallocate(r9, 0x10, 0x4000000000000000, 0x200) [ 1403.361060][T22559] FAULT_INJECTION: forcing a failure. [ 1403.361060][T22559] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.439769][T22559] CPU: 1 PID: 22559 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1403.448722][T22559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.458843][T22559] Call Trace: [ 1403.462186][T22559] dump_stack+0x11d/0x181 [ 1403.466559][T22559] should_fail.cold+0xa/0x1a [ 1403.471346][T22559] __should_failslab+0xee/0x130 [ 1403.476729][T22559] should_failslab+0x9/0x14 [ 1403.481429][T22559] __kmalloc+0x53/0x690 [ 1403.486144][T22559] ? terminate_walk+0x1d0/0x250 [ 1403.491374][T22559] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 1403.497145][T22559] tomoyo_realpath_from_path+0x83/0x4c0 [ 1403.503468][T22559] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 1403.508877][T22559] tomoyo_path_number_perm+0x10a/0x3c0 [ 1403.514393][T22559] ? __fget+0xb8/0x1d0 [ 1403.518816][T22559] tomoyo_file_ioctl+0x2c/0x40 [ 1403.523606][T22559] security_file_ioctl+0x6d/0xa0 [ 1403.529296][T22559] ksys_ioctl+0x64/0xe0 [ 1403.533574][T22559] __x64_sys_ioctl+0x4c/0x60 [ 1403.538194][T22559] do_syscall_64+0xcc/0x3a0 [ 1403.542746][T22559] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1403.548665][T22559] RIP: 0033:0x45a919 [ 1403.552577][T22559] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1403.572222][T22559] RSP: 002b:00007f0a2429ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.581014][T22559] RAX: ffffffffffffffda RBX: 00007f0a2429ec90 RCX: 000000000045a919 13:33:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x9, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1403.589183][T22559] RDX: 0000000020000040 RSI: 0000000080489439 RDI: 0000000000000003 [ 1403.597310][T22559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1403.605473][T22559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a2429f6d4 [ 1403.613766][T22559] R13: 00000000004c3b13 R14: 00000000004d9158 R15: 0000000000000004 [ 1403.669177][T22567] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1403.675804][T22567] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1403.692294][T22567] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) sendmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB]}}], 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) socketpair(0x1e, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) creat(&(0x7f0000001840)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x7, 0x7}) pipe(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='\x89\xba\x00\x00\x00\x00\x00\x00l\x000\x00', 0x0, 0x0) fallocate(r5, 0x10, 0x0, 0x200) [ 1403.910711][T22559] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1404.113861][T22519] IPVS: ftp: loaded support on port[0] = 21 13:33:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4c}, 0x2a0}) 13:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xa, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:28 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r3, 0x10, 0x0, 0x200) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000000)={0x3, 0x0, {0x6, 0x9, 0x13, 0xa01}}) [ 1404.558187][ T9713] tipc: TX() has been purged, node left! [ 1404.635900][T22606] FAULT_INJECTION: forcing a failure. [ 1404.635900][T22606] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.660453][T22606] CPU: 1 PID: 22606 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1404.669160][T22606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.679300][T22606] Call Trace: [ 1404.682714][T22606] dump_stack+0x11d/0x181 [ 1404.687084][T22606] should_fail.cold+0xa/0x1a [ 1404.691687][T22606] __should_failslab+0xee/0x130 [ 1404.696538][T22606] should_failslab+0x9/0x14 [ 1404.701039][T22606] __kmalloc+0x53/0x690 [ 1404.705204][T22606] ? tomoyo_encode2.part.0+0xd9/0x260 [ 1404.710602][T22606] tomoyo_encode2.part.0+0xd9/0x260 [ 1404.715806][T22606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.722049][T22606] tomoyo_encode+0x34/0x50 [ 1404.726645][T22606] tomoyo_realpath_from_path+0x14a/0x4c0 [ 1404.732358][T22606] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 1404.737820][T22606] tomoyo_path_number_perm+0x10a/0x3c0 [ 1404.743392][T22606] ? __fget+0xb8/0x1d0 [ 1404.747480][T22606] tomoyo_file_ioctl+0x2c/0x40 [ 1404.752317][T22606] security_file_ioctl+0x6d/0xa0 [ 1404.757340][T22606] ksys_ioctl+0x64/0xe0 [ 1404.761501][T22606] __x64_sys_ioctl+0x4c/0x60 [ 1404.766105][T22606] do_syscall_64+0xcc/0x3a0 [ 1404.771452][T22606] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1404.777349][T22606] RIP: 0033:0x45a919 [ 1404.781429][T22606] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.801027][T22606] RSP: 002b:00007f0a2429ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1404.809437][T22606] RAX: ffffffffffffffda RBX: 00007f0a2429ec90 RCX: 000000000045a919 [ 1404.817403][T22606] RDX: 0000000020000040 RSI: 0000000080489439 RDI: 0000000000000003 [ 1404.825490][T22606] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1404.833459][T22606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a2429f6d4 [ 1404.841560][T22606] R13: 00000000004c3b13 R14: 00000000004d9158 R15: 0000000000000004 [ 1404.901854][T22613] IPVS: ftp: loaded support on port[0] = 21 [ 1405.059755][T22606] ERROR: Out of memory at tomoyo_realpath_from_path. 13:33:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) sendmmsg(r3, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB]}}], 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) socketpair(0x1e, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) creat(&(0x7f0000001840)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x7, 0x7}) pipe(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='\x89\xba\x00\x00\x00\x00\x00\x00l\x000\x00', 0x0, 0x0) fallocate(r5, 0x10, 0x0, 0x200) 13:33:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc5b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x400) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x4222, 0x0) fallocate(r5, 0x3, 0x0, 0x200) 13:33:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xb, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:29 executing program 1 (fault-call:1 fault-nth:2): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) [ 1405.341971][T22630] FAULT_INJECTION: forcing a failure. [ 1405.341971][T22630] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.375645][T22630] CPU: 0 PID: 22630 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1405.384544][T22630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.394726][T22630] Call Trace: [ 1405.398037][T22630] dump_stack+0x11d/0x181 [ 1405.402460][T22630] should_fail.cold+0xa/0x1a [ 1405.407146][T22630] __should_failslab+0xee/0x130 [ 1405.412020][T22630] should_failslab+0x9/0x14 [ 1405.416596][T22630] __kmalloc_track_caller+0x4f/0x690 [ 1405.421938][T22630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.428204][T22630] ? security_capable+0x92/0xb0 [ 1405.433128][T22630] ? btrfs_control_ioctl+0x4d/0x250 [ 1405.438409][T22630] memdup_user+0x2f/0xc0 13:33:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xc, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1405.442737][T22630] btrfs_control_ioctl+0x4d/0x250 [ 1405.447792][T22630] ? btrfs_show_options+0xa20/0xa20 [ 1405.453043][T22630] do_vfs_ioctl+0x84f/0xcf0 [ 1405.457590][T22630] ? tomoyo_file_ioctl+0x34/0x40 [ 1405.462591][T22630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.469014][T22630] ksys_ioctl+0xbd/0xe0 [ 1405.473198][T22630] __x64_sys_ioctl+0x4c/0x60 [ 1405.477816][T22630] do_syscall_64+0xcc/0x3a0 [ 1405.482468][T22630] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1405.488452][T22630] RIP: 0033:0x45a919 [ 1405.492376][T22630] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1405.512370][T22630] RSP: 002b:00007f0a2429ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1405.520801][T22630] RAX: ffffffffffffffda RBX: 00007f0a2429ec90 RCX: 000000000045a919 [ 1405.528844][T22630] RDX: 0000000020000040 RSI: 0000000080489439 RDI: 0000000000000003 13:33:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x9, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:29 executing program 5: syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getpgid(r1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mmap(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x2800005, 0x8010, r3, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r4) r5 = open(0x0, 0x0, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[], 0x6) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r6, &(0x7f0000000200), 0xe) mmap(&(0x7f0000017000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x2b696000) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r5, 0x40044591, 0x0) r8 = open(&(0x7f0000000100)='./file0\x00', 0x800000141042, 0x44) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x200000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp, 0x14200, 0x800}, 0x0, 0x9, 0xffffffffffffffff, 0x0) openat(r7, &(0x7f0000000140)='./bus\x00', 0x80000, 0x94) r9 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0x0) [ 1405.536832][T22630] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1405.544821][T22630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a2429f6d4 [ 1405.552973][T22630] R13: 00000000004c3b13 R14: 00000000004d9158 R15: 0000000000000004 [ 1405.577772][T22613] IPVS: ftp: loaded support on port[0] = 21 [ 1405.605098][T22628] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1405.635701][T22628] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1405.719503][T22628] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:30 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x60}, 0x2a0}) 13:33:30 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in, 0x0, 0x20000000005, 0x2}, 0xd8) r0 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r4, 0x9}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={r4, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) 13:33:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xd, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1405.976136][T22649] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:30 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in, 0x0, 0x20000000005, 0x2}, 0xd8) r0 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r4, 0x9}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={r4, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) [ 1406.017931][T22649] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xe, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1406.121313][T22649] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1406.156947][T22659] IPVS: ftp: loaded support on port[0] = 21 [ 1406.182910][ T27] audit: type=1804 audit(1577626410.511:200): pid=22647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1634/bus" dev="sda1" ino=16593 res=1 [ 1406.388607][ T27] audit: type=1804 audit(1577626410.541:201): pid=22647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1634/bus" dev="sda1" ino=16593 res=1 13:33:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc6b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:30 executing program 1 (fault-call:1 fault-nth:3): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:30 executing program 0: socket$inet6(0xa, 0x6, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r5, 0x1000008915, &(0x7f0000000100)="0815b5055e0bcfe87b3071") r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0xfd6da37298dcc428, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000200)={0x2, 'bcsf0\x00', {0x3}, 0x7}) r7 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r7, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="6b65797269b840910f"], 0x9, 0x2) sendmmsg$inet_sctp(r7, &(0x7f0000004640)=[{&(0x7f0000002100)=@in6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000}, 0x11}, 0x1c, 0x0}], 0x189, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r9, 0x0, r8) shutdown(r8, 0x1) 13:33:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xe, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:31 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x10, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1406.959976][T22699] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1407.020753][T22699] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1407.095593][T22699] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1407.254356][T22659] IPVS: ftp: loaded support on port[0] = 21 [ 1407.361169][T22714] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1407.368054][T22714] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1407.377476][T22714] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1407.532393][T22718] print_req_error: 540 callbacks suppressed [ 1407.532416][T22718] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.557308][T22720] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.565488][ T2502] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1407.580498][ T2502] buffer_io_error: 526 callbacks suppressed [ 1407.580515][ T2502] Buffer I/O error on dev loop3p5, logical block 33008, async page read [ 1407.587327][T25123] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1407.599248][T22717] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.605101][T22718] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.624888][T22721] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.645801][ T2502] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1407.654437][T22719] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.657149][ T2502] Buffer I/O error on dev loop3p2, logical block 33008, async page read [ 1407.676898][ T2502] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1407.679258][T22717] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1407.688628][ T2502] Buffer I/O error on dev loop3p4, logical block 4080, async page read [ 1407.688993][ T2502] Buffer I/O error on dev loop3p4, logical block 4094, async page read [ 1407.717459][ T2502] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 1407.725902][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1407.733998][ T2502] Buffer I/O error on dev loop3p5, logical block 33022, async page read [ 1407.742444][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1407.742660][T22718] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1407.750651][ T2502] Buffer I/O error on dev loop3p2, logical block 33022, async page read 13:33:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x68}, 0x2a0}) 13:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x11, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:32 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) connect(r0, &(0x7f0000000140)=@ethernet={0x306, @random="a8bed4700f73"}, 0x80) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "7dbaa720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 13:33:32 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x2, &(0x7f0000000040)) 13:33:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc7b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:32 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x6) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r2) sendfile(r0, r1, 0x0, 0x80001d00c0d0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x80001d00c0d0) [ 1408.409127][T14574] tipc: TX() has been purged, node left! [ 1408.433186][T22749] IPVS: ftp: loaded support on port[0] = 21 [ 1408.442631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x12, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1408.478561][T14574] tipc: TX() has been purged, node left! [ 1408.502851][T14574] tipc: TX() has been purged, node left! [ 1408.518348][T22741] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:32 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x10, &(0x7f0000000040)) [ 1408.603713][T22741] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1408.622156][T14574] tipc: TX() has been purged, node left! [ 1408.692208][T22741] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:33 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4c00, &(0x7f0000000040)) 13:33:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x13, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc8010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1409.391725][ T27] audit: type=1800 audit(1577626413.721:202): pid=22762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17377 res=0 [ 1409.450514][ T27] audit: type=1800 audit(1577626413.751:203): pid=22791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17377 res=0 [ 1409.518969][T22788] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1409.548823][T22788] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1409.559359][T22788] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1409.618787][T22749] IPVS: ftp: loaded support on port[0] = 21 [ 1409.749360][T22799] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1409.760837][T22799] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1409.790797][T22799] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6c}, 0x2a0}) 13:33:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4c01, &(0x7f0000000040)) 13:33:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x14, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) connect(r0, &(0x7f0000000140)=@ethernet={0x306, @random="a8bed4700f73"}, 0x80) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "7dbaa720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 13:33:34 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) connect(r0, &(0x7f0000000140)=@ethernet={0x306, @random="a8bed4700f73"}, 0x80) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "7dbaa720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1409.990570][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:33:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5421, &(0x7f0000000040)) 13:33:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc8b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1410.129192][T22817] IPVS: ftp: loaded support on port[0] = 21 [ 1410.131723][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:33:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x16, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5450, &(0x7f0000000040)) 13:33:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x17, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1410.627095][T22827] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1410.644199][T22827] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1410.683942][T22827] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:35 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5451, &(0x7f0000000040)) 13:33:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x13, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1411.152770][T22844] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1411.201074][T22844] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1411.260133][T22844] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1411.356282][T22817] IPVS: ftp: loaded support on port[0] = 21 13:33:36 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x74}, 0x2a0}) 13:33:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x7ffff, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x12, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:33:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) fanotify_init(0x200, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, r1, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x2, r0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x80, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x90002) sendfile(r3, r3, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) 13:33:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5452, &(0x7f0000000040)) 13:33:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc9b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:36 executing program 0: ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, @bcast, @rose={'rose', 0x0}, 0x7, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x8, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x70, 0xfb, 0x9a, 0x3, 0x0, 0x0, 0x3, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0xb6c79b46ff34523e, 0x0, 0x2, 0x7, 0xb126, 0x7fffffff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x5}, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) gettid() lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = timerfd_create(0x8, 0x800) pread64(r3, &(0x7f0000000400)=""/139, 0x8b, 0x6) perf_event_open$cgroup(0x0, r2, 0xa, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000700)=@id={0x1e, 0x3, 0x3, {0x4e22, 0x1}}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000800)="8c895a57e8ccd2125d7d657d86c17db05242cd4f2183cf99923f32724287b53c32925f98407130dd90da8cea847f1152e55da3ac1a18165e871912cfb9cc799e0f3007aa81e101df47b3dbfdf8f28481b9f0856d8ecec320a6a1227a4795228096d3e810105c1dfdce154e75b6724f1b0fd9058ae8d238b767d70505ddc5eed4d1f4c4a976e89ee245f42a594cd5018f821236b9e9b7da934b6b03aa3662ed54245d274d2c6fb06febccb39fe173da301c2cb7ac38157a6eb1481299afc3e4850e47c0e25e41f5f7e9a7319ac622e3565bebe48bf47d447f86cec3d5678a8b3034dee4ea76", 0xe5}, {0x0}], 0x2, &(0x7f0000000b40)="d5c0c3cf10500f5669343c4d2a8cf990e53d153bf9598247ba231a2a5e6610e1239af395e4feaff90ef8915e8c006da1ad5279306df3", 0x36}, 0x80000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/123, 0x7b}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/70, 0x46}], 0x3}, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 13:33:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5460, &(0x7f0000000040)) 13:33:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x2}, 0x18) [ 1412.268892][T22888] IPVS: ftp: loaded support on port[0] = 21 [ 1412.288626][T22880] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1412.385113][T22880] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1412.437322][T22880] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x6364, &(0x7f0000000040)) [ 1412.490666][T14574] tipc: TX() has been purged, node left! 13:33:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x7ffff, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1412.548498][T14574] tipc: TX() has been purged, node left! [ 1412.555995][T14574] tipc: TX() has been purged, node left! [ 1412.576744][T14574] tipc: TX() has been purged, node left! 13:33:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x4000}, 0x18) [ 1412.638773][T14574] tipc: TX() has been purged, node left! [ 1412.782654][T22910] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1412.798568][T22910] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1412.824811][T22910] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1413.025954][T22888] IPVS: ftp: loaded support on port[0] = 21 [ 1413.029983][T22921] print_req_error: 962 callbacks suppressed [ 1413.030005][T22921] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.049871][T25123] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1413.053358][T22924] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.094023][T22922] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.094927][T22925] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.126255][T22926] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.134021][ T2502] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1413.142713][T22927] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.149305][ T2502] buffer_io_error: 937 callbacks suppressed [ 1413.149317][ T2502] Buffer I/O error on dev loop3p5, logical block 33008, async page read [ 1413.174850][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1413.185781][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1413.194002][ T2502] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1413.204962][ T2502] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1413.213030][ T2502] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1413.224873][ T2502] Buffer I/O error on dev loop3p2, logical block 33008, async page read [ 1413.233293][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1413.233634][T22925] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1413.242095][ T2502] Buffer I/O error on dev loop3p6, logical block 4080, async page read [ 1413.258351][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1413.261585][T22921] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1413.266728][ T2502] Buffer I/O error on dev loop3p6, logical block 4094, async page read 13:33:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7a}, 0x2a0}) 13:33:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x8912, &(0x7f0000000040)) 13:33:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x2}, 0x18) 13:33:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xc9ffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="4257a65d00cfff53df3e9e1ad2626a19fc89a13fa440f15aa9427e12f615915ba4a5287686010000800a788ec386409ba0183e"], 0x1) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000600), 0x4) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x9c0000, 0x262, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9f0001, 0x7ff, [], @p_u8=&(0x7f0000000000)=0xf}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r3) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x100, 0x8, r3, 0x0, &(0x7f0000000140)={0x9b0962, 0xffff6d4e, [], @ptr=0xffff}}) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/mnt\x00') 13:33:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x60ff}, 0x18) 13:33:37 executing program 5: setsockopt(0xffffffffffffffff, 0x0, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) getpid() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), 0x4) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, &(0x7f0000000100)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000180)={@remote}) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="73616375726974792e3ba333d18f976711b45fc906b4bf5b6ff173ec0a57d1e477ab3a000080efd577b092d90f1b9fc258de5ab9fe7ca4ad5f075c27687376502980d9660b15b14c3feaffc6eae503eae63c8d6f048bb7b44dfd94f717a3"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000001fc0)=ANY=[@ANYRES32=r6]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) [ 1413.587725][T22941] IPVS: ftp: loaded support on port[0] = 21 13:33:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x8933, &(0x7f0000000040)) 13:33:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x7600}, 0x18) [ 1413.672716][T22940] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8400000004) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x22002, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x40000000000001c4, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x10000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$nfc_llcp_NFC_LLCP_RW(r6, 0x118, 0x0, &(0x7f0000000240)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_GET_THP_DISABLE(0x2a) r7 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x1) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000200)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000040)=0xe42, 0x2e8) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') writev(r1, &(0x7f0000e11ff0)=[{&(0x7f00000002c0)="59000000140019232b834b80043f679a10ff6400940005002a925aaa000000000100008400f0fffeff2c707f8f00ff050000000010000100090a1000410400000000fcff00000000000000000000000000000000000000000f", 0x59}], 0x1) [ 1413.692918][T22940] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1413.773454][T22940] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:38 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x8940, &(0x7f0000000040)) 13:33:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x9600}, 0x18) [ 1414.078322][T22940] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1414.664701][T22941] IPVS: ftp: loaded support on port[0] = 21 13:33:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x300}, 0x2a0}) 13:33:40 executing program 0: socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000000)=0x80000001) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000000340)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 13:33:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x400454ca, &(0x7f0000000040)) 13:33:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xca030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:40 executing program 5: setsockopt(0xffffffffffffffff, 0x0, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) getpid() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), 0x4) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, &(0x7f0000000100)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000180)={@remote}) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="73616375726974792e3ba333d18f976711b45fc906b4bf5b6ff173ec0a57d1e477ab3a000080efd577b092d90f1b9fc258de5ab9fe7ca4ad5f075c27687376502980d9660b15b14c3feaffc6eae503eae63c8d6f048bb7b44dfd94f717a3"]) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000001fc0)=ANY=[@ANYRES32=r6]) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) 13:33:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x307100}, 0x18) 13:33:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x40049409, &(0x7f0000000040)) 13:33:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x400000}, 0x18) [ 1415.913796][T23038] IPVS: ftp: loaded support on port[0] = 21 [ 1415.935320][T23032] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1415.963335][T23032] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1415.992587][T23032] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x40186366, &(0x7f0000000040)) 13:33:40 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x10) listen(r0, 0x0) timer_create(0x1, &(0x7f0000000140)={0x0, 0x1, 0x4, @thr={&(0x7f0000000080)="ae0f4c792fa84e8898242e0e7ca755259ea4f9ce60625208edb4ed6524a2cde461bee8eb384eb5f04c7bb83cd809ddaf1d4ddfa070d6fd80f4e12ae6a531907045ed3258f9cd16fb89b9be778ca84209f2a4edba0fab76e7ef95f77104f12b87e068aa41774c2d4067b89a6b1886d5cbf2", &(0x7f0000000100)="108cdb35176cfb17a476a8718aebe7e6264048a2f41722bf0d82efb93fafb3fc19a489f96cfbd23dab4750eac3e8efdb25ff48a32ac3f5738f"}}, &(0x7f0000000180)) 13:33:40 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="7c0000002400070500"/20, @ANYRES32=r0, @ANYBLOB="00000000ffffffff0000000008000d00000000000800010073667100480000000000000000000000000000000000000000000000000000d5b4a6aa000000e5fff0ffffffffff00000000001d0000000000000000000005000000000000"], 0x7c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = fcntl$dupfd(r5, 0x0, r2) setsockopt$inet_opts(r6, 0x0, 0x0, &(0x7f0000000100)="bf198f88a7c4708b1d202c2a92d2e5f1c8a17129a8421343fd001be432515dc9fc16f1ddd7a5fc0ea55694f711b271b9335fb71e8a4f20872aa999c65049d7f2a3360952f49b03014e1ecc34bab36b2f721d7af6f9c331b69c1a8e8a978d20007d00592b7a716ac8498f7e417afd337fc9c35f6f25370791a3e3fea31060e6b1f4fab136e39deaefbb25935f1f98fb43684ecb0ba981ed2f2f6d3be9c5c51b485fef029345494e404dd312948b", 0xad) sendmmsg$alg(r1, &(0x7f0000000180), 0x572, 0x0) 13:33:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x4020940d, &(0x7f0000000040)) [ 1416.900692][T23038] IPVS: ftp: loaded support on port[0] = 21 [ 1416.918264][T14574] tipc: TX() has been purged, node left! [ 1416.924902][T14574] tipc: TX() has been purged, node left! 13:33:41 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x500}, 0x2a0}) 13:33:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x405100}, 0x18) 13:33:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x50009404, &(0x7f0000000040)) 13:33:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xcab30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b7050000000000006110200000000000dc050000400000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x48) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f00000000c0)) 13:33:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x12, 0x5, 0x4, 0x2000000, 0x8, {}, {0x5, 0x6, 0x0, 0x6, 0x1}, 0x7fff, 0x3, @fd, 0xac57, 0x0, 0xffffffffffffffff}) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x840}, 0x20000080) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) write$9p(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xc4, 0x1, 0x1, "697723eab24568c806c748efc35a629c", "1edbb085cf3772c5c0f72afd3aabccc83ec51efffe1d394228bb4389c994e2fb2e635a17df584cf1cdf69d8391a9d06a05ff90b882aa2b2d78436988170c350985f5bb0028b43e7813e802b4978d1a4218ffb6728cf22054f7414032d38b99226c5e6b5d05c9b7a900ccbc13c82baf0b17771eb14768d2386aad0078277bd1b84ec244009e87fe0b255cfbd8ba6bc0f8a99d3e100cda4bb82d60bdd8dc42a23a68b21b3067a8cea89a56c91730ca22"}, 0xc4, 0x3) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x8dffffff, 0x0, 0x500, 0x0, 0x8000000055}, 0x98) 13:33:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x50009405, &(0x7f0000000040)) 13:33:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x514000}, 0x18) [ 1417.139356][T23090] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1417.148293][T14574] tipc: TX() has been purged, node left! [ 1417.154299][T23090] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1417.192449][T23100] IPVS: ftp: loaded support on port[0] = 21 [ 1417.233929][T23090] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x800454d2, &(0x7f0000000040)) 13:33:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x405100}, 0x18) [ 1417.288671][T14574] tipc: TX() has been purged, node left! 13:33:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x713000}, 0x18) 13:33:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80086301, &(0x7f0000000040)) [ 1417.716578][T23090] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1418.242026][T23100] IPVS: ftp: loaded support on port[0] = 21 13:33:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x71c000}, 0x18) 13:33:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x514000}, 0x18) 13:33:42 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x90009427, &(0x7f0000000040)) 13:33:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xcbb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:42 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x600}, 0x2a0}) 13:33:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x12, 0x5, 0x4, 0x2000000, 0x8, {}, {0x5, 0x6, 0x0, 0x6, 0x1}, 0x7fff, 0x3, @fd, 0xac57, 0x0, 0xffffffffffffffff}) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x840}, 0x20000080) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) write$9p(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xc4, 0x1, 0x1, "697723eab24568c806c748efc35a629c", "1edbb085cf3772c5c0f72afd3aabccc83ec51efffe1d394228bb4389c994e2fb2e635a17df584cf1cdf69d8391a9d06a05ff90b882aa2b2d78436988170c350985f5bb0028b43e7813e802b4978d1a4218ffb6728cf22054f7414032d38b99226c5e6b5d05c9b7a900ccbc13c82baf0b17771eb14768d2386aad0078277bd1b84ec244009e87fe0b255cfbd8ba6bc0f8a99d3e100cda4bb82d60bdd8dc42a23a68b21b3067a8cea89a56c91730ca22"}, 0xc4, 0x3) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x8dffffff, 0x0, 0x500, 0x0, 0x8000000055}, 0x98) [ 1418.784590][T23159] IPVS: ftp: loaded support on port[0] = 21 13:33:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0xc0045878, &(0x7f0000000040)) [ 1418.842143][T23152] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x760000}, 0x18) 13:33:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x71c000}, 0x18) [ 1418.888391][T23152] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1418.929463][T23152] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0xc0045878, &(0x7f0000000040)) 13:33:43 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x50009404, &(0x7f0000000040)) 13:33:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0xc0189436, &(0x7f0000000040)) [ 1419.266875][T23170] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1419.300776][T23170] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x960000}, 0x18) [ 1419.418903][T23170] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:43 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x300}, 0x2a0}) 13:33:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0xc020660b, &(0x7f0000000040)) 13:33:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xccb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1419.719375][T23159] IPVS: ftp: loaded support on port[0] = 21 [ 1419.833967][T23202] IPVS: ftp: loaded support on port[0] = 21 [ 1420.130027][T23209] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1420.137430][T23209] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1420.155061][T23209] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:44 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x700}, 0x2a0}) 13:33:44 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)) 13:33:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000800)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @local}}, 0x0, 0x20000000005, 0x2}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc4c85513, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000000)={r8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000280)={r8, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)={r8, 0x60, "3cdd8ad7d9db28acf0f7dfdb0094b2bd5a3a62cc17eaa3b29488d6b646678c2b5490e2bc6a492b703ae6c685a0c0ac0e29dce3d737c0f6e18e757142b8e06ac240012d1ea17288b4c7dd9555bde5568f2ee1561cbdb15b95ca9f1cef9d993fba"}, &(0x7f00000003c0)=0x68) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000400)={0xfffa, 0x9b, 0x0, 0x5, 0x5, 0x80, 0x400, 0xc7, r9}, 0x20) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x184800) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f00000001c0)={0x5, 0x2, @name="382a0a2e550b67d8d6b1e03ba7d3c98aa18c1e9e153cd34bf5e967c5198b9b4a"}) ioctl$CAPI_GET_SERIAL(r10, 0xc0044308, &(0x7f0000000140)=0x7) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x7ffff, 0x4}, 0x100) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = socket$inet6_udp(0xa, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$sock_SIOCGIFBR(r13, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r13, 0xc0bc5310, &(0x7f0000000280)) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xc07100}, 0x18) 13:33:44 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x2}) [ 1420.343567][T23209] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1420.384575][T23209] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:44 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x3}) [ 1420.454384][T23209] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1420.476489][T23228] IPVS: ftp: loaded support on port[0] = 21 13:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x1000000}, 0x18) 13:33:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x4}) 13:33:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xcdb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1421.141721][T23251] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1421.162052][T23251] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1421.185545][T23251] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xc07100}, 0x18) 13:33:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x5}) 13:33:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x2000000}, 0x18) [ 1421.339556][T23228] IPVS: ftp: loaded support on port[0] = 21 [ 1421.489223][T23261] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1421.514813][T23261] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1421.556572][T23261] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1421.758189][T14574] tipc: TX() has been purged, node left! 13:33:46 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xa00}, 0x2a0}) 13:33:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xc07100}, 0x18) 13:33:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xff600000}, 0x18) 13:33:46 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x6}) 13:33:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xc07100}, 0x18) 13:33:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xceb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1421.938185][T14574] tipc: TX() has been purged, node left! [ 1422.088195][T14574] tipc: TX() has been purged, node left! [ 1422.169284][T23286] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:46 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x7}) 13:33:46 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) sched_setscheduler(r0, 0xd, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f0000001200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x317a80, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x9, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) dup2(r5, r4) socket(0x0, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0xfffffffffffffffd, 0x100042) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PPPIOCGIDLE(r7, 0x8010743f, &(0x7f0000000140)) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) getpgid(r8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000180)={0xfff, 0xb99}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) userfaultfd(0x65eddfe6250a2fa4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 13:33:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x400000000000}, 0x18) [ 1422.225887][T23286] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1422.244359][T23295] IPVS: ftp: loaded support on port[0] = 21 [ 1422.246891][T23286] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1422.268218][T14574] tipc: TX() has been purged, node left! 13:33:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000000)={0x0, 0x7530}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r1, 0x18000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00\x00\x00\x00\x00\x00\b\x00', 0x2, 0x3, 0x290, 0x0, 0x100, 0x0, 0x0, 0x100, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0xd8, 0x100, 0x0, {}, [@common=@unspec=@physdev={{0x68, 'physdev\x00'}, {'ip6tnl0\x00', {}, 'nlmon0\x00', {}, 0x3f, 0x6}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00\x00\x05\x17\xa4\x0fg\x1f:\xad\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'ipddp0\x00', 'rose0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00\x00\x00\x00\x00\x00\x00\x00 \x00T2\x00', 0x4}}}}, 0x4f4) 13:33:46 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x8}) [ 1422.398313][T14574] tipc: TX() has been purged, node left! [ 1422.405866][T14574] tipc: TX() has been purged, node left! 13:33:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x60ffffffffff}, 0x18) [ 1422.697393][T23321] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 1423.229573][T23295] IPVS: ftp: loaded support on port[0] = 21 13:33:47 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x2000}, 0x2a0}) 13:33:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xcfb30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000000)={0x8, 'nr0\x00', {'ip6tnl0\x00'}, 0xffff}) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 13:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x760000000000}, 0x18) 13:33:47 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0200"}) 13:33:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x60ffffffffff}, 0x18) [ 1423.648817][T23368] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x60ffffffffff}, 0x18) 13:33:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0300"}) 13:33:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x7fffffffefff}, 0x18) [ 1423.670078][T23368] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1423.680462][T23371] IPVS: ftp: loaded support on port[0] = 21 [ 1423.777613][T23368] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:48 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xa00}, 0x2a0}) 13:33:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB='}'], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000000)={0x8, 'nr0\x00', {'ip6tnl0\x00'}, 0xffff}) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='_'], 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000000080)=""/62, 0x3e}}], 0x251, 0x0, 0x0) 13:33:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0400"}) [ 1424.139063][T23387] IPVS: ftp: loaded support on port[0] = 21 [ 1424.748963][T23371] IPVS: ftp: loaded support on port[0] = 21 13:33:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4000}, 0x2a0}) 13:33:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x960000000000}, 0x18) 13:33:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0500"}) 13:33:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd0b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x231) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffc4a) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000002200)=ANY=[@ANYBLOB="302451ba8975d1e70000801efc167cc010e48b5e96d8372d4e51bf6ae35033a4dd87b6ff188e93daf71f0000005a67dbfe7933497c1dd97cddf462a24e82e9be4cac2a528d846b7a26f2131631c906e2bc2adf427c60", @ANYRES16, @ANYBLOB="c030044b44f475fec7f7f9315fd060de009844e9c154165837968be08606720a716bb1a00467e4d0447098462c01a617716f671d4bea402ab477e09312169082"], 0x3}}, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000000)=""/133) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f00000001c0)={0x1, 0x0, 0x1000, 0xc3, &(0x7f0000000300)="e5f784a7fdef0a77653c40d2bc3768e6e5c22188f7e276af26962f6f5e32fcd1f5b408f6dea72983aa260de06100691edc4ae1f093f6c13e23ea4c265722bbcc730bbca1c28da68df4c863c5a4a2213e67c2a675be10f734e38fe54c2d6d1d5282a43155e38b2d2ee780234b8d511a1d13c3d674bd4c23f98089ea555664b567db4594eda81102e6641c5ee0af4b56cbee886282130235b7ef9ab9f86983a7a1fe4c9af1f543658bb3e78b771b6a00d25c69366657d4eb071c0285e7bfd8a53c8df125", 0xd3, 0x0, &(0x7f0000002100)="b92d7eacac19b8f90515ca59d7a4250a2bd2af1b98195e9b2d96fc1a54627aa4158c7ecb5d22bf1729b313673872a9fd449c97c5f152e235f3787e2c247d7b654b68f5a899e076341dc668b2024a9d72e4e35991a4751ee42b2e5d5fa95a55fba735f6d5e5e476300434d9b5297e8ed9cdce4e2c74656ff9d0aff7b23d81cf17341587e8d24bc1bdacc6a006c340396f8205dcd84d30938ea3f2754ab039f0651d04b2a2e9c01d3497d3422b417c097105cc853ad221bd1f6772702e2d6baa74296c58785b30c4d2fc17e2057d2c67301599bf"}) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000001100)="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", &(0x7f00000000c0)="f9070a3602910d3a88dc4a6d5356137c5c162e4130bb7cd3affff52ad11c03aef6a6c76eccadbc4f698a1dce"}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000440)="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", 0xc16) 13:33:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) restart_syscall() sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r3, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffffffffffffff74) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r6, @ANYBLOB="ac0c000000010000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) [ 1425.696089][T23442] IPVS: ftp: loaded support on port[0] = 21 [ 1425.719437][T23435] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0600"}) 13:33:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x30710000000000}, 0x18) 13:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x960000000000}, 0x18) [ 1425.822385][T23435] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1425.898380][T23435] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:50 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x8400) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000001580)={0x53d2b708009d0c60, &(0x7f0000001540), 0x1, 0xffffffffffffffff, 0xe2c1a59609f47730}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = dup(r2) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x1006, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r4 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) remap_file_pages(&(0x7f00001ae000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x100020) write$cgroup_pid(r4, &(0x7f0000000300), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r6, 0xffffffffffffffff, r7}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x4, r2, 0x0, 0x268}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) r8 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000001400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x0, 0xb}}, 0xf) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) gettid() openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) 13:33:50 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./bus\x00', 0x2, 0x4, &(0x7f0000001900)=[{&(0x7f0000000300)="5ad37f968441aed65614a91b5aedc38e9c173d709cd00d9aa500a39861b0a042a1a18cdc30b0d208029446e08a9aede4f6dfb835096c0f528f1ec2e6f0389ef93e1815f5480321fbaf89321bf9e4ddb1c0c7319ac5d2e92d91aadbe78dceab2b076cb976c3905c9fdd7a7adb513d5f4dc6798528ba32413ac94dc03a13d130596dc599bb4f3a80dcde5cd6f6f4d7f3c5d2636f0661750905d91f2e6233f58d511c5d673977382dea2b444b2991c285b51ac373b05231008b653f81225679212f597833c22672ac38a7fbf2c0945e06860272dd20d640820fb60b64e30b", 0xdd, 0x3}, {&(0x7f0000000900)="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", 0x1000, 0x960}, {&(0x7f0000002040)="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", 0x1000, 0x9}, {&(0x7f0000000400)="d105ac441ce185e7c794b71a20861033182c8a271a74021deb67c48d83a77967b22b0bf9", 0x24, 0x9}], 0x8, &(0x7f0000001980)={[{@locktable={'locktable'}}, {@barrier='barrier'}, {@commit={'commit', 0x3d, 0x7}}, {@acl='acl'}], [{@audit='audit'}, {@audit='audit'}, {@measure='measure'}, {@audit='audit'}]}) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x200fff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r6, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="5400d90a650004002dbd7000fcdbdf2500000000", @ANYRES32=r6, @ANYBLOB="0a000a00020000000c00040008000b0005000000080005002900000008000b0007000000080005000140000008000b000900000008000b00d2e80000"], 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x20008001) 13:33:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x40510000000000}, 0x18) [ 1426.298237][T23465] print_req_error: 3257 callbacks suppressed [ 1426.298257][T23465] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.316989][T23435] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1426.336660][T23466] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.377292][T23467] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.401560][T23468] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.404479][T23475] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.429109][T23469] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.457797][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1426.468754][ T2502] buffer_io_error: 3176 callbacks suppressed [ 1426.468768][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.483544][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1426.494625][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.504225][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1426.515207][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.523745][ T2502] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1426.534743][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.543165][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.551629][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.559879][ T2502] Buffer I/O error on dev loop3p3, logical block 0, async page read [ 1426.567967][ T2502] Buffer I/O error on dev loop3p4, logical block 4080, async page read [ 1426.577158][ T2502] Buffer I/O error on dev loop3p6, logical block 4080, async page read [ 1426.577264][T23466] Buffer I/O error on dev loop3p2, logical block 33008, async page read [ 1426.966066][T23442] IPVS: ftp: loaded support on port[0] = 21 [ 1427.044511][T14574] tipc: TX() has been purged, node left! [ 1427.050729][T14574] tipc: TX() has been purged, node left! [ 1427.070618][T14574] tipc: TX() has been purged, node left! [ 1427.076688][T14574] tipc: TX() has been purged, node left! [ 1427.083376][T14574] tipc: TX() has been purged, node left! [ 1427.089577][T14574] tipc: TX() has been purged, node left! [ 1427.096059][T14574] tipc: TX() has been purged, node left! 13:33:51 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4800}, 0x2a0}) 13:33:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\a\x00'}) 13:33:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd1b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xc0710000000000}, 0x18) 13:33:51 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./bus\x00', 0x2, 0x4, &(0x7f0000001900)=[{&(0x7f0000000300)="5ad37f968441aed65614a91b5aedc38e9c173d709cd00d9aa500a39861b0a042a1a18cdc30b0d208029446e08a9aede4f6dfb835096c0f528f1ec2e6f0389ef93e1815f5480321fbaf89321bf9e4ddb1c0c7319ac5d2e92d91aadbe78dceab2b076cb976c3905c9fdd7a7adb513d5f4dc6798528ba32413ac94dc03a13d130596dc599bb4f3a80dcde5cd6f6f4d7f3c5d2636f0661750905d91f2e6233f58d511c5d673977382dea2b444b2991c285b51ac373b05231008b653f81225679212f597833c22672ac38a7fbf2c0945e06860272dd20d640820fb60b64e30b", 0xdd, 0x3}, {&(0x7f0000000900)="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", 0x1000, 0x960}, {&(0x7f0000002040)="78eb494c7e4710e131f926abb758aa9dd62a3f08cd35ef9a796892d92a1d5ca67b3031fb69bad7e27ba52e0ecae2728642dce16564594cc520c74dd81cb4f20f60ba998578ff9c89872ece86fd02c31a542311804433529e3765a37d980ba18826ed3e44f8e8be69fa9f2d87370e0585c211cfad9126fbe93a9a4b18718f1a1348b2ee5fe2521a305cf2d1a78d11de182aa1bf5b63406dbc06c693d95c1a7d4b46689aed74fc13407998d6a691e16959981e2e7844a8ac5ffa3b038e1aeb355bea88136e7b1519cab83c9b4f6d06047fe0df0fcad735bbb23dbf9ad823010e787e158cad86c618a60db4e50371ca73c909b88fd56a00212c2138802881dc854d8e4e9a6c6466dfdffd8659b345f53249ff1381cec9c831b78749630baad8cda9dd26f22ac64912687f28f60791d56785c12bf0b5babfee8f3110f5fd77a82cfb44f046309a946ef0993f94beeeffb4d9f027a171b79a1c2a2df72639c8df9cce0b59afe2d616264a665db22be10b6c5ba30a422ce2a962a5e6daf50ebfbc1b13efaf9df92456a5e8abb3fc71bb35f535bec8dd03bcda9caa07964be37bff34a4e93a0e4899db7aa230e032aac8e5723bb1ee62e3d573c5e3d0709d73b0d648a5f9fb07081ec91feabca5b7ef49323431249681a19aed824b14614cb5d47005a158482c63952c012d458438a3d9d918b7d8b9f8b7c2fac1b35df5aa4789a5b65903c36a92c68d35148bc2e1692fefcb45a8eaff470179086a1633e38db33e0b0b1cd57e58f234fc8a85d7022f929dce25114b4e12d0940c5bcac275d10d4fb152caa3a46553f535a804647da03fa662eea29525d871a34b96110f295834ac292dc4397320b9c77c4d2453a2de92727d73f84a627d18c6b09fb3f836dd493db2e88bd506abe6b98cde4b14e8c0f031425defd0140253711cc5aff98b1825ad4455ef574e5602596323d9d61d49e53e1989c8fabb537cec79b208d35dcbb66a6d9828ef335bcc94ddc082fef7d482b65b0bb6c8a9992e19b25a8507be297e64467ce312f563f3b51dde3de608dac6b3882f4318a38fa402e908f4d95e94bd57255e1f73a66cb3d53b3a4c349b3b29f3fe4e77323caf3a72ec30508f51fb54644ab6cdbb587a5c1b43c0a6b2835093b8beebea2c9f558eaee63a491fb02531a1154c3b9df8d5d8e93b1a0fb0c5e79c8119ba0a5a780f66752256e1848cff7dc4f3f03d3c02893e5183491c6ac26e4e66f5284046083ce8ea7f0397885e4db65f1c5b9aeb7528c72b2e30c7aaffc8b2b1c373137b8ac06bd449beef40125f681d2d874d3600ae97c162b50544b87a17da86357d91c905f11f84901b000fe528820d25e278dd9169a236e010baff3fd723c511a26a1b15042f39c39a780db7909ec94aba54c1cdf0d4025e0d8179795f73990445c116b23e8f60257589ca84dafb58726a52613d6a1ea519e82683267a3092d64d82567ce079b80baaeaa84c117298f7497f3a5a785a5da8d6087e9a2e89966f4c4f5df368df665821f36757c0995a1734169034818fdb2cbf81c389ff4958ed063454bbd09a9d990fb9f74f8c52db1d7e75ec3f9c9c8aae19c2edbcee480a9bda3c84040247bc997cfff876ad5a7112febf9ffa71e57404da99b8f1ea84852da6e8fd45bdd486f9f23d7b0d1863038d16b8e1deb5a17d4d226ce15106ca0bcf1d730e7252e25874c42e9dec2640074b6ff0b182cd6d6da8e3bddea158a6f5066f44f5f6571a42e9d94697497d890b50e6a81602cf910d84d88238fde8d3fcb91bce57153f0c99b25798999e26a4c9895b9317180ca1b339fb93d2b0c2f384206d25a5dd29e4d1aded46f23a90e7c8bac680dd2310bd393b0aa2be2a026d7d4fbff21969742ab5e3b09432fdff74067a8142b350a886bda43f2acd2e0a49c89d2fd7a534376a98d0051d1681e024a87861aca108910bd4e9ceabf421428ba0534fba2426b289ccda3d6bbe422039ffd75733b7e11f4507624bff4f8c2f6b465c3f9d142da8571fbe248abee993ffd0c1ca9fbdd62ef9ee96a9b824178f321d0ee78fc84754d8f85ed2af6c5e16f9bb490c1ffc4dc3d52c74df879deb531c694891772d9a6c4c700431410a950174018ff1e56dbd22864a0a93d90f49fa40fc1fcc716882d7194ffdc5eae2a01a155b49f01c7deed7a1c19ff60f12b179add9461a259908389031ce3a0b78fb32d01967984bb60f7f5fc4e167ed85c95d56f96b25e296e2524a81d4b417594fc8cbb837a381c0093e7688c264290e917198794b3b97f4f1e008ab332d09aea72963bb33f091151053dd8480f6894390b173fbf6fbb72981814a177fd376f70693db82ead38a159d811032a2e3bc05edccb7a84c27b4261fc0859d2955b35710258a827a72cfd296bd8483de3fe713be33ecedd6f51f5a8e71cb92fe4fa107b1696a4f9b84d3ce65e3de861120c06b5aa7209595859023fe947f6ea873d7fe4a45c52e670731729e7fe1514a9de933f51987a2a778ef2a2a91a9803d470fe627adfece13d8ad4f1e2354667169a63ce86b26e478bdfe8ecfd12f1686cd94fc39f280f84837cca76676a639158c19add1a128d688ac8e420e29c1499d28ff36035269a6df133ce5667360ce5956ed154223c485d406fb97ff15d728e05bfec834353b21d4de53b000929442a6c6ffb9719bae832958966e3ef4248b71c7e9c3d4787a2dc277d9db3a3fbb86212292a0fa74102a42ddecf489c736f3e23715b90562d331298eda05cea57d29dc5423e16259ee28b25218030a01555489fc5668f4e2dc644f839728eb9945b560a944c2493c0abd9f56a9fa80eeb0b9c37cdf038c93a6f8edc93d7143449ce2baa8c3632eb68c216d051b5e1bf69f9f75d55cd2c6f5ea486d4636c659237f3f29f56c26765acb0db6a3a0f5a4f61bb33820d60552e1266ff098b94c52a4fda3f50e6b7f4f555bc88ac0656614b3e6aa6a5797aeae46a3b8c76d194b649574ccdd76374931434f8873517cbebc7fc25d9444388e30577e0e75f083e96ea1d7771ff06eaf41e20e813cfa785ce891c4637cb23ffaec42b4151b740fa5ed9eb905f35e4cb2202b71e553a40dbb2d84c08f3a397ce169c52c48cec39df6320050f9580c45a62b9ddb1e6dc183cbe5d750b156e603ca0ac514211843672856e785d64b123fe61a67ddd26006ad18aa35b0c589d6a14a5524bef4912a6b467b9120539c8082cccf433cf21fa2ef5c31c8e2c6386d00d389b83806943dd7b21c9f797edf5de91a06b2e3c13e8ca1c43724b67d8ecbfd1e8fe0a96791897205d8827c2cd4f98c30ad7277bcf581bcb8e1d213a617cc0db6c51484c3d0bb3203e6f6043148538a8cc835e84b31b79844dc0d15b114ec5d5ff63012636020a19be111e634c73b8020f9573cf7cb747f52bb9db75e45b3eca7a1c2da57b908a1ded28ecadaef965f119c14183dc1a9b61dcfafe8572df29550058ad251f98f89742f8d531ae6274ebe042d4b014ec95a9d0c0a29315456d47adc66beaffdc071835e7a19f77856a07566b8483e7aaeb1a61d7a72f69d34d5145e94959f4939e1e75765bbd1e71b779bbe664f01d17d1ff50eb284038ab13a872ea2756681f9a7be01aff2bf1b5b4e632c77e0ea58ac40e2b371f4037a35c6ddfce2173245d5b48d5d7dda1727d28e465a999e49bd3b84f2f4893c40a9b3fc18c4546a658532f2fffc7eb4cd4fda303b6c5236f2c9eb1a4df986957a07a4265182b37e5592677df1685c4c3fa78113d4b9c13dc80601154591fcc41e559d40d20220c72d8f85c1d2f7b841ad6db0333cfdfd8b64181e6fb692b939353187450e5740cde0abdbf51bb3437bc6cd643bc693541345a2764d46f3f2ebe75e1fb57f15833cc1f2d2b3c93ee3814821c306165cebe8faa9751c5a1523dd96aab7518cb71ace64b289539f44d6806555eae7f640d07ae84457f50f6c18f5f60b63fde061ebae1dc46f7352f65eabdd10d058652509c1e22704c48d95526049a51e2659284199f82ec0d597c938484015ba1be045dab57738f2ee5ec30d4263edc91de46b198e2f742981008415dcd8c12c80cb5b00468907758f23c8de45ec3a4faeb9f3a458ca2fa19e36ed730474d7f0bf2d036574bde2332cb5161edadb0ba49fa2b46328cf517806eec80e299918e1ceed457addbcae4c3da2a40a5f59797a66f95081c15b204a2255ac97eb8189bc140d433f8bfe97441fd128c8f590b32bc431f7a6b8736643112e57d926b222de3fafd6527a073571246e67f642c6fc0e6aa8d93642a1034b54eee9dffdcc2c09c8eea1d0588f0e69a7234e2d2dad57eb3aec8012217477cecb249dbf33dc1d5922010eadecfde71f0c805c1f900033e54a34cce3b9bfa299872307af4ad99f45948c11717f13a7df66f3123b2fe674ebcf7a75da7afeb01ad946c47fdf2a7f6564dc4abb1a60ad931f8fb20918668afbb3ae6ed167c883af3391d3ba9d604889b2da31d48fb177708351a8e2767faa9dcdbc101a97ba9296c08a32f03501ae99ebfa3c53ade60ad66bfb78044fd24d14f99241b0e062efa14c392158d7ae33aab6d24b87748a473a981bdb4211f226af0d96c1c2951d661535882d75089d11c6ff7ef3346ebe757c89a22a1cf87b4f63b142cf9d7f0a8cf6431b26a8a3af77304a68a5649b5bc07202e6a723152f547117202e6eb0046b03845b67caf3fb1293b1ce419357c4eac514bf1688a791fbd3d837854a6edecf9ae84b64de68b1c33afba61fb4de6334bff49d46e546f490f0d24ba7e0d6329dfb7fabc992a184d05ce10f4bf0c3bf55a62a465eba75ea8e7c45c6c7f9d8dfd021e515ee5ee62836e261d8b830b38ecc473dc9e33404437e6ee2db1ccbccbe714d074c8af0228c39c67e1297c592d0ac80f58398745323cacb7d5714cb83210f8cd6ef1054dd10fecde05593883ae7d87ec41417664512fee264aa77a451a42be570868fe0b6e9e2e6dd11fb357f775192ca4ca708501341b069b4e11b04c0377c6a51b153b5115d1e51f6bdac592e57c999e82686011d2add299bea67bfbca5e2c7ae7e92a59eeb687f5b60b96c48488bd5ad235c5ba727d7c5a874f907bd08fbf36c993d3aca703b82af89ff52a450f4084f42a6a564bf2ee2d4dd6256e2af89addd7c43b173fe59df731bff70e49c451eced8f73ff96f0b4862216d643a8d21cac70592969344b07d5473b4f6bffedca142357e5e190e81172dbc71ef5628546a45782e0da38913faf44d9cdf739ed8401988b9d696770940f4ed11c343ea86c6b902779fd2892fa7c7122f2c31b42f1b88f829bb670bb27c4f26fa50bd970b0f98cfb5c68e9bb1bd957e0756c914af361968065f6187afa2ed2c92ef110e111cfc3cdd09feac2daaa6088f010f96a377e2550026032556b093a79d0f49cfa303ba40fd3435c7e0b075225ef106f63efda3f08f85cb4df9fe401df5d7d25d7d1303222cfa6c6d2755b8dde3b87d39919e1e8892b98a2d227d524c090ade9a94102ff8e6561d940a96883879bd1654b1705500917206e5157a0de2cc03dbe821a08599ccf3528c21da8af679314e00a2e0e14fad2491661de8029ee193c65ae72805219d302254092736e19bd524151cf1b02abe239e945b5ea1d523cf7c6e1d830aab293ea7f358188ce4b0d019e915cc257478622d4fcef66fc1ea0efc529a4409e7de52f24a6d8a347fda891d04d5d4f3ccd3f845fc7e8cd9614ac5c7161bfbc0098a92992706c239b2be629c920395b5719001d4c92984be718cb0119b", 0x1000, 0x9}, {&(0x7f0000000400)="d105ac441ce185e7c794b71a20861033182c8a271a74021deb67c48d83a77967b22b0bf9", 0x24, 0x9}], 0x8, &(0x7f0000001980)={[{@locktable={'locktable'}}, {@barrier='barrier'}, {@commit={'commit', 0x3d, 0x7}}, {@acl='acl'}], [{@audit='audit'}, {@audit='audit'}, {@measure='measure'}, {@audit='audit'}]}) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x200fff) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r6, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="5400d90a650004002dbd7000fcdbdf2500000000", @ANYRES32=r6, @ANYBLOB="0a000a00020000000c00040008000b0005000000080005002900000008000b0007000000080005000140000008000b000900000008000b00d2e80000"], 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x20008001) 13:33:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\b\x00'}) [ 1427.730658][T23502] loop3: p1 < > p2 p3 < p5 p6 > p4 13:33:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x100000000000000}, 0x18) [ 1427.786940][T23502] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1427.824595][T23502] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000300"}) [ 1427.902390][T23512] IPVS: ftp: loaded support on port[0] = 21 13:33:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd2b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4000}, 0x2a0}) 13:33:52 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x8400) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000001580)={0x53d2b708009d0c60, &(0x7f0000001540), 0x1, 0xffffffffffffffff, 0xe2c1a59609f47730}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = dup(r2) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x1006, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r4 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) remap_file_pages(&(0x7f00001ae000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x100020) write$cgroup_pid(r4, &(0x7f0000000300), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r6, 0xffffffffffffffff, r7}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x4, r2, 0x0, 0x268}]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) r8 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000001400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x0, 0xb}}, 0xf) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) gettid() openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) 13:33:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x200000000000000}, 0x18) [ 1428.503669][T23538] IPVS: ftp: loaded support on port[0] = 21 [ 1428.593155][T23512] IPVS: ftp: loaded support on port[0] = 21 [ 1428.682762][T23547] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1428.715059][T23547] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1428.731055][T23547] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1429.084771][T23547] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1429.124335][T23547] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1429.156097][T23547] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xffefffffff7f0000}, 0x18) 13:33:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000500"}) 13:33:53 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4c00}, 0x2a0}) 13:33:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd3b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0x200000000000000}, 0x18) 13:33:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xffffffffff600000}, 0x18) [ 1429.752277][T23576] IPVS: ftp: loaded support on port[0] = 21 [ 1429.829071][T23581] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1429.864566][T23581] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1429.894740][T23581] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:54 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000600"}) 13:33:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xffefffffff7f0000}, 0x18) 13:33:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd4b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x78) [ 1430.748870][T23602] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1430.765366][T23602] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1430.793976][T23576] IPVS: ftp: loaded support on port[0] = 21 [ 1430.802381][T23602] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1431.052236][T23602] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1431.161868][T23622] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 13:33:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc3, &(0x7f00000000c0)=""/195, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x7}, 0x10}, 0x78) 13:33:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0, 0xffefffffff7f0000}, 0x18) 13:33:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\a\x00'}) 13:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x20000158) [ 1431.958243][T14574] tipc: TX() has been purged, node left! [ 1432.098127][T14574] tipc: TX() has been purged, node left! [ 1432.238242][T14574] tipc: TX() has been purged, node left! [ 1432.398213][T14574] tipc: TX() has been purged, node left! [ 1432.558379][T14574] tipc: TX() has been purged, node left! 13:33:56 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6000}, 0x2a0}) 13:33:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd5b30800, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) r0 = gettid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/113, 0x71}, {&(0x7f00000000c0)=""/78, 0x4e}], 0x2, &(0x7f0000001280)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/244, 0xf4}], 0x2, 0x0) 13:33:56 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00ff00"}) 13:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000080)={0x9, 0x0, 0x2008, 0x9, 0x4, 0x5, 0xbc76}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r6, &(0x7f0000000100)="056a2357d731d67e12441b25ce249feb301a706f61522b421b98c6c26191f544a865152486c10bb8"}, 0x20) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000000c0)) 13:33:56 executing program 5: clone(0x60000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0xa10000, 0x2, 0x6, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a69, 0x7, [], @p_u16=&(0x7f0000000080)=0x6622}}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) clone(0x881ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc0000, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000040)={0xd, 0x1ff}) 13:33:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000100"}) [ 1432.758185][T14574] tipc: TX() has been purged, node left! [ 1432.777804][T23678] IPVS: ftp: loaded support on port[0] = 21 [ 1432.801803][T23674] IPVS: ftp: loaded support on port[0] = 21 13:33:57 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xd042b0cceeb573b9, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)=0x3) pipe(&(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)="f6d3409ae3dd624bcb7f69bce7bef4", 0xf}, {&(0x7f0000000000)="d5", 0x1}], 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) getsockname(r6, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) setsockopt$CAN_RAW_FD_FRAMES(r7, 0x65, 0x5, &(0x7f00000002c0)=0x1, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) [ 1432.861112][T23673] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1432.868558][T23673] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:33:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x30000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1432.953264][T23673] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:33:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000200"}) [ 1433.111265][T23674] IPVS: ftp: loaded support on port[0] = 21 13:33:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200000, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/151, 0x97, 0x40000040, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000280)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 13:33:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000300"}) [ 1433.762566][T23678] IPVS: ftp: loaded support on port[0] = 21 13:33:58 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6800}, 0x2a0}) 13:33:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x7fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f00000012c0)='2', 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x541b, &(0x7f00000000c0)) 13:33:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xdc030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000080)="a73607c164f91a195eff4220ba235d9cf7f9d4b88288a1d523b23804334fba27a24424ad8bbde83413d9626c8b3c10361bf463e9633756dec7c673125715a1d548857b2a1a88c6666fbb58e77e5395ca5695379e328f9547af26b1840f1a47ebe1e6178bb4026ff89f8bba390e350c6b5d49db339c44b48989bc7d656bb05eff6279fda852fe348e5fd8154cdc44a684bacba37cf4b4b5df05029c"}, 0x20) 13:33:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000400"}) [ 1434.090020][T23737] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1434.124926][T23737] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1434.145335][T23741] IPVS: ftp: loaded support on port[0] = 21 [ 1434.201894][T23737] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1434.568720][T23732] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1434.577468][T23732] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1434.598158][T23732] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1434.877888][T23741] IPVS: ftp: loaded support on port[0] = 21 13:33:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000080)="a73607c164f91a195eff4220ba235d9cf7f9d4b88288a1d523b23804334fba27a24424ad8bbde83413d9626c8b3c10361bf463e9633756dec7c673125715a1d548857b2a1a88c6666fbb58e77e5395ca5695379e328f9547af26b1840f1a47ebe1e6178bb4026ff89f8bba390e350c6b5d49db339c44b48989bc7d656bb05eff6279fda852fe348e5fd8154cdc44a684bacba37cf4b4b5df05029c"}, 0x20) 13:33:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000500"}) 13:33:59 executing program 0: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) sendto$llc(0xffffffffffffffff, &(0x7f0000000180)="b433e0727a822d50e23a498b80528d16ed", 0x11, 0x800, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1057ccb0b32db9fb2463d91f"], 0xc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) syz_open_dev$rtc(0x0, 0x8000, 0x2000) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x1305) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) sendfile(r1, r1, 0x0, 0x8800000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x2c) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0xd000, 0xfab83c7824996e63}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f00000001c0)='\x00', &(0x7f00000002c0)="308b3cb41c5425e8c8c1ccd27c4e1323e380ccd367410c513437ea96c75a20f06ec2e2e0b5190f22a4bbe08de0f65d1eca7840de919c68d564ff3a27413446df082e4f9e3edfa6c42b74fd14f453f7717bfe9b0d0369b6b365eda6f5f6ddf3ee5edbba9f053fc0ed5327673495e81d8a0e2b45358a47fc275bb9d4df845c46bd95d35cdcd0bcbd6ad3a39e80d05486f37c91920c13971e20cced453328b71274065efbb64f45102c324e04a03f3cd1bda901c72f977d16940d1b4ee30d947363ddde8e91fce622771c9d1251c3fa676a2e00ce6bd35a949b77d803684266e22403c35f1506d9feea65ada23ced664a8cafcca828c5907e78343ebf1b8c9a8d4e8f34d984c360688e9fcc57e203f2f3b71c2a34e2629429dda337c1df9d645d2b5fa7d5d4151ecc24804e628492164d5e75fb75ac9eb0ac68490d551f2a89cd74cfb8dc9e4e8c67417a5cbcca33d65765cdf63e9125155c650ace5c9909bf6fe3ae9e3659008bab14882e744b0ae780d78d325e4b548f03c2a5e51b4dfcbc212a821269ce0b15486317fc75d7a16ef7b8cf8af5024636dbf3b00a27a792cf1a17ebddbc34530d53290a4786dc99bc0f2b39802cd4e704e2d1a1f273d601f4f2dd520804c0969fc213cc3b4dcac60c70f04478f2ad69068e85b67dd3265cd1c5ad9572cef893bc36aa46a51af640cb213b17ef05c1bf358386bf00ad7dd3302a2b7cdd06f2c9318644e3da4fb9e2dc2e8a9e6d1b6789ce5f0d397f6ad495705f0344ce306a7a1a1c3ed66ec06e94c26f71676f05a4b80bb3388e1e75d8cea0869fd34b0c890a569024e24f93e8f740626b74350f575964a262be6b143b7baa1b87f10aaa5be54afd2427d7a0d9e81ce353637b729d9b0ddcdf4c73c53ba52bd8ee996f13146464b1a87d8673fc435adbeba2c3f1fb6b73ebad635223b60ce84d00e71f2834e2ecfa0668ad1e1bfa8940961586eac09e09c0b916b03d7cb98dab6e07f4203214a7f236f9082609be1f7e0108983d8e0892c61ecda01bd2270dc906c3a055c3692770622854fea37be2c4413e287ee190b1dd02978cd943ad523f289913a65407cf61b6d5c4a1ecb9a5edd42d430d9e6fdfc6946032be5c4d56400c682dfe174eab467caa4bd12ecefcdb8e03123903c50eb59316dad703d476e77335c7840c7db6f618e6315a623f182d366b7c73d11988cfc463a26a1f83848ff2a04eb9d3b8c1f3422e164d172e6f6137b126ed0cf00e27a15ce8b73e3d454843fa384f87bb68315c2eaef75851f3894dea0e1cb1c411ccfab5d3a69e8511ceaba37f614087d2b56509201d578d634e1bf626b04d493f5205d5c54727db6a6def354be0eb4b491e49e78afb4864396439a0653f74c1186a981b145623c6e0490113716749a450f6de1a4378bd401fc59991b9a39bf9441b206c4ffb907396f9b01efb5cd1efe3dbe74a1d6872ffbc7d79a8c6e78d59eaa102a8489aa3e1ac823fdc3104a33d32f392d0adfd8569be4684845bda681ddc31fcf97e712d0094aa7000d10bcdc0fbb8fc3931d017cef5b2ff633a894341013db61994af2e926944aa14726e3c03a0ccb29fb25b4dfbb10f2e60bbb543a218cf2cc199eae3888e72a605e29067270c4dfe0f1c564c01adb7b0b200dc07936ea1c07ba386c5f8d8935d98f69726075535af4a48bc9edee87c43e0b3d6bba42a3474d11d5b9801a8eb4025a1819698476379dc769e2f44bfbdd06aa7e87cf928296abcadc5a1733c28fea8b37aa4d972c0e81f8f11997da2cbecc4046cd2bd8ffe59303dfa85a68d1fadb8baed8688f44b83cd8a6af61ab42c0f3709bcfbdbb09cf198889a2100ab2b856ec8f8fc354c209a0bce5259c25fad8ad81ac00d360450c133ec7f249233c40925da1f438f8e3f5951f822ed10c4d6e9997eb39b7f9dfe508812747d690e1d4b12098f9113a2b7127aba8168d3803e71ee2210de1cc9342de55e0fa9a43bbd785b5fd303efe994797793c8b9df631c75b93fe65675dda063d8e71f2bc3e821ec78370c5abe898787f1d505c5de260efeda0cc8b1aed6199851b4673f226edb1c929a878e7c976c638a1f358a0762e09d6612ae71a5bfe8c06294b4db758c02b709b92fa4e52a855718b3051795fd8a120dc5653eb5a56d76bbc52d97ab4c4d6f6b2644f4a573f507794e9487e8f4a815d3690837c5dbf9204815b2466087a3625a17f50845f9f9847c94d0fe5b64e4cbeaad3db914a0e53caf61f219390b61c1fc3f63645e2ce36a04aca9c04358cd55c3c8761888abaeaba84c8896830975f5e5f550a27f5a85486ef084743ae787c612f997e97bb4a55f5b155d621556c01aa2f3c64e100f5b04dae3e37967eac042d335c7f0e020e58ef8e8c1c84d8ad41c47c50da7522ed9d995a8feee2175e78427017a4d5bfc3fa01ba004982f22d023714849cc517b89b94bad0263f0319c3bd848dd29a64bc32efd7402bd187a09e680f679d57df2bef8dcb8e0b5892d3cb5b7e5c1c21386eb00fb9f79feef285a2309a5eb6c93eb54b7bf77630c8027902e2342e1e91ed9e7c625d5e69630d334ceb655ffa07f2955d696e744f6051e580d094394ee306e64b5314135443b84638c7f6551162cd58804cbc0fb6fbb05f825c6691220f45c8614a8ff314f4d6305860fb14eff0dd32e7c361343a34ab019acffa1f12c531b4b1ed10812841f656cf58f0af6cd359c4fb02eae6e1fc2c2e198346300fc5361d18ff05a0875ac2bf4e51df279577e207936861bd6d18d24736d9bfa618c45507e61eb0a2668fc3fc1f98eb6938eef130eba5a9c09d8186e93bf458227659586a86f175b57a69faeaaf79aab4ccd133ac53ac1c52ee22134efc225664defb21d5697dffce3a39eaa19b4ecc340804b9a0dddd600655724fe27352fd2569943ad83a66c27b6867a5b4422c8aad05e808a3d72e65a5feef810719be065c6a55f68e9b76b4bc3b98307d661c738e87919b6c67d693659cb41c5977051e4a307bb9a4b43caf858a6bb0974644b0a5db793ea64ff623d861944f679d9ef17e813da07f47791e959a42aee1273c4f4aa36264c9fc7b2a1076ee9043057a3ccc40b6d1ad8fe1220c7a82b2383ddd898c75f2936ccd53b9a1a4ccd7981b7ad930b01022dcb22830eb159db02195963eb9de0e6cb98ed52707f60508305d3f3259f0f4394726ad0b8ff1e2ed98836b20bd03875f18b8352fbd4be915ff17d2d629c2dedf8c8be23828e7c6cf5513787320e9f1d8cf7ec3fdeea0419852f41b667119b7c8b3b297eda99957af521987e789ea815cc67cf546e8aa7b816961c6aa6d477a943b83ae7e818786802f6f1925a3a44971e61c6704b004ce6c0bd8d4689fafbff04b7c11ce23448f39ce8a1153d5137f210510aba2e05d8ce4b3797a72df47b917bb189d548d3b6ed79c5302fefb8683c30dd8a5ed6df5fc282fc1bb758e3dba48a02d009e8e542f24d91b0bcf5e2f1e0f61fa4bf0d9083ae24484947ebb9bcbbb04a74d56cea68afd3ff9168fc9218d531a90236c7b2fc09f4ae19fb5417f0fc32e96af565f59fc5bd7994deeaf3d5ab9245a1183fd7c1e10f71bd99b208239946807bdd5a7080ea85450e70a6b91a4d672f4ed9f9531ba0e062ed32e9be53ef9ceee2f66646e743da7fbdf74af500ae8b4695c687b2b2030eb4671aa5dd342ebd3c7f2aab152a56620d31c7b673e7b26f7e790015ca3aad58c41c57df49ed62edb540c253ef9ff70075a951870a46960de28dc2823a58461bd117736cd794e576b7be3271b47f33126eff42778b7405ceed97e43437ccc75e14a695f59417d026e749d52190636698e4c4549fd2fc916a076b0763b327088abde39560fc9e8b2c39e99d18b44b8c22889454a4a34ca61fafacb25b862e5f28adefa951106d1fc9a83beb906cddeb1b68730da58a3e3d9cfa9b0bfdd3dfa3f6141c61a2f561f0849157c2dfe703e465ed4a5661113259661cbc16f8a73efa6b3df3a17ca8bc481989b35d8b522e1eba39c6d9d0c9a51e8889405376c6966b49ad73e39759399521f5164dc5a6e18b8c446673ebde5325b9408e7afe6aa68947e03a9363e461e07a2ea2fc8e91362ffe8f4c4e657e677959daf51fad58092426422c10632286d2d13760685b17b44e68b34f901214ec614d450c2dbc196d95ca2fd9a617ef35b8be09d57ffdad9fcebd4fa600cf3a2b3631ec5795d66e762324262b4d4f9bd101482c244e3baba7c3f02bd320e698efafdc37f418a2f08397c3ba2fc2492034c858a985f5851274a72458dcde61b94d9dfd540611cbef2e60e7371fcbf0802fc83f6d0483f140c62c34a6d1124494d6570f285165526295272daf35350f1ecde2a3daf12900605612fafda5ef34957eedf11bc07b10885c23cdd3341af0c0c6d707f27fa649158b53e4dd8c5dd66c05ccdbc20d55258687f1fd49de197c0e7899a6351ee9eb7f542ccf5551e14d7e31c810c9089b4faa321692ebc1350db96e03673cd05b65959ce3a4e33a760663d1121967fde71b0e1bc202cfcef56e4742a99dcc6fb742e66fd0a3fbf7901afea1a5373809ea4a375af793d9a7854abc9c19eb72aeab8576657798cd78b2579631dfe3d6eea78894f1c294089e40f77b7e65679b6965cd21239505c3fda74dbd2603b6ef8db92c51d9d3bbcaedd272798a7385472a28a12e56c744ab8cbf9eed119ad0ab746737184950ea173b320ee31f0290f9c569199deeb8b0c204d9d85cc5ed92508c4daf2ec07fbfeaa6f700a2b547952d0750e7ed73788b40e1d9a52efe62d1a3fe7c7a28b88268013f2f52385c895e3285ed3d286becdf479f402bae68deb6634b16902a7ac069c2f7ce8909c64a52c32793ee7ec8ec5058c491ffb3d7f78ca88f4721fc00e59117c6d1cf3ff9f20730b5c28efc99a7076942b9d3c16cfcea2c466e21e970b7b1de8e5a747bde1cd3d934977c80665887e0280d04b236f5f3e0915c048e9b8bbac4dedbd4de690216443f4abf3de25976e499b154e3dccbaa73c8267f3ab7eec5de6914978376e40c8b6f8b67cb20972361cbbd0c9eafbc5fdddc019618527aed6ff9db5a70ef5ac6f5f9af12dedc397cbe3722cbfd92fc3a851168599c35b273e0844dfa0d241d961745126024d6e4d79cc807b14d40b39c9c3ed33f164d5aafab0cd259d4f73dcfd526f0bd4055ed293a1383c3298f6cb1af98d750d350999c147caf5ff9900cb9a88c4c76e73c75bd0fb22c6308f7b866133f371b4ba296c08473b552c58adfe90b4ed95cad50e4c31d749d3ed40cd4b51585da4915ee97f1e683bfc74b5b1331081632ed7615400d02bfdcd9a544eee6db748441ae97f944481536c672b59d32c43cf7f1a0713f6ff43be43fa6f08269132c5a58da00e52944d907f8978d7a971a2b0a0cee0b5ae9bc6e83133828ad1c1675b9c2c1c3b471cae7167aa9b89b2e0e886177fc90eb47662151718b4fd331b59c824404a171421afe2f9d4a63fa97a3ebde897d323b757087d20a2011db0c24d1716439f792afc56e3b803cc0c6fac7c5e00195dd91063b6aaac06b6fc7e9443c5e0906914005656d2166e22c20667719b1753f8b005ba0ee550b24e6225c46f53c7b3766fc5f6306b2ce184f8de56e6326248fc32ed6a25d18e450285c82e888c8011530b8e5024dc7d59b5e6a073a03c303b502cdde9127ae6d302911767d1ea65c67367e0205d049e5a0f097b20d6f63030a9be85109da15e99e694245c20b5ef3f186035736c60a243999f8b21ed6ba57f281084f6cfd", 0x1000) syz_open_dev$vcsa(0x0, 0x0, 0x640080) 13:33:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @remote}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) write(r3, &(0x7f0000004400)="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", 0x1000) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdb2, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xdf15a3f13fea0398, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:33:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xe0010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:33:59 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6c00}, 0x2a0}) [ 1435.331837][T23772] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:33:59 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000600"}) 13:33:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000080)="a73607c164f91a195eff4220ba235d9cf7f9d4b88288a1d523b23804334fba27a24424ad8bbde83413d9626c8b3c10361bf463e9633756dec7c673125715a1d548857b2a1a88c6666fbb58e77e5395ca5695379e328f9547af26b1840f1a47ebe1e6178bb4026ff89f8bba390e350c6b5d49db339c44b48989bc7d656bb05eff6279fda852fe348e5fd8154cdc44a684bacba37cf4b4b5df05029c"}, 0x20) [ 1435.416783][T23771] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1435.423493][T23771] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1435.438413][T23771] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1435.468201][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1435.474023][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1435.479830][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1435.485581][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1435.497771][T23786] IPVS: ftp: loaded support on port[0] = 21 13:34:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r2}, &(0x7f00000000c0)=0xc) r3 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r3, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={r2, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r2, 0x81}, &(0x7f0000000300)=0x8) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x4e2653f1e50ca069) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x58, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1f, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca00000800ffffffba000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 13:34:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0}, 0xfffffffffffffd7c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) recvmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f00000011c0)=""/120, 0x78}], 0x5, &(0x7f00000012c0)=""/185, 0xb9}, 0x10001) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @remote}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x0) sendto$inet6(r3, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) write(r3, &(0x7f0000004400)="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", 0x1000) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdb2, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xdf15a3f13fea0398, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:34:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\a\x00'}) [ 1435.740925][T23799] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1435.785880][T23799] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1435.819438][T23799] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xe0030000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\b\x00'}) 13:34:00 executing program 0: r0 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000400)={0x4, @sdr}) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) fcntl$setstatus(r1, 0x4, 0x42000) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x0, 0x0) ptrace(0xffffffffffffffff, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r5, 0x0, 0x1, 0x4}}, 0x20) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x2, 0x4, 0x3f, 0x14, r3}) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) socket(0x2, 0x803, 0xff) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140), 0x1}, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800fe) r7 = dup(0xffffffffffffffff) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) r8 = dup(0xffffffffffffffff) write$FUSE_BMAP(r8, &(0x7f0000000100)={0x18}, 0x18) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$rds(0x15, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r11, 0xc0205647, &(0x7f0000000200)={0x9b0000, 0x3c6, 0x1, r12, 0x0, &(0x7f0000000140)={0x990a6b, 0x3, [], @p_u32=&(0x7f00000000c0)=0x400}}) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r9, r13, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 13:34:00 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "fffffdfd00"}) [ 1436.499486][T23839] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1436.518517][T23839] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1436.554315][T23839] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1436.596593][ T27] audit: type=1804 audit(1577626440.921:204): pid=23838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1867/bus" dev="sda1" ino=16721 res=1 13:34:01 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000ff00"}) [ 1437.231289][T23786] IPVS: ftp: loaded support on port[0] = 21 [ 1437.279249][T14574] tipc: TX() has been purged, node left! [ 1437.285627][T14574] tipc: TX() has been purged, node left! [ 1437.301973][T14574] tipc: TX() has been purged, node left! [ 1437.322099][T14574] tipc: TX() has been purged, node left! [ 1437.332200][T14574] tipc: TX() has been purged, node left! 13:34:02 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7400}, 0x2a0}) 13:34:02 executing program 0: r0 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000400)={0x4, @sdr}) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) fcntl$setstatus(r1, 0x4, 0x42000) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x0, 0x0) ptrace(0xffffffffffffffff, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0, r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r5, 0x0, 0x1, 0x4}}, 0x20) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x2, 0x4, 0x3f, 0x14, r3}) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) socket(0x2, 0x803, 0xff) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140), 0x1}, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800fe) r7 = dup(0xffffffffffffffff) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) r8 = dup(0xffffffffffffffff) write$FUSE_BMAP(r8, &(0x7f0000000100)={0x18}, 0x18) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$rds(0x15, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r11, 0xc0205647, &(0x7f0000000200)={0x9b0000, 0x3c6, 0x1, r12, 0x0, &(0x7f0000000140)={0x990a6b, 0x3, [], @p_u32=&(0x7f00000000c0)=0x400}}) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r9, r13, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 13:34:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xe1000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_OPEN(r2, &(0x7f0000000000)={0x20, 0x0, 0x7, {0x0, 0x4}}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:02 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "fdfdffff00"}) [ 1438.094426][T23884] IPVS: ftp: loaded support on port[0] = 21 [ 1438.183535][T23887] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1438.237493][T23887] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1438.273874][T23887] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:02 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000100"}) [ 1438.291162][ T27] audit: type=1804 audit(1577626442.611:205): pid=23880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1868/bus" dev="sda1" ino=17009 res=1 13:34:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = dup(0xffffffffffffffff) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000100)={0x6, r4}) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r3, 0x80585414, &(0x7f0000000080)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:02 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000200"}) 13:34:03 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000300"}) 13:34:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xe4ffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = dup(0xffffffffffffffff) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000100)={0x6, r4}) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r3, 0x80585414, &(0x7f0000000080)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1439.289279][T23922] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1439.318386][T23922] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1439.398565][T23922] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1439.636536][T23884] IPVS: ftp: loaded support on port[0] = 21 [ 1439.679035][T23935] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1439.721209][T23935] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1439.772611][T23935] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7a00}, 0x2a0}) 13:34:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000400"}) 13:34:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000200)={{0x2, 0x4e24, @empty}, {0x6, @local}, 0x41, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ifb0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000100)={0x0, 0x411, 0x2}) ioctl$SNDRV_PCM_IOCTL_STATUS32(r1, 0x806c4120, &(0x7f0000000080)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000008c0)={0x9b0000, 0x7, 0x0, r6, 0x0, &(0x7f0000000880)={0x990a6e, 0x2, [], @value64=0x6}}) accept4$rose(r7, &(0x7f0000000900)=@short={0xb, @dev, @rose, 0x1, @netrom}, &(0x7f0000000940)=0x1c, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(r9, 0x4070aea0, &(0x7f0000000280)={[{0x3ba, 0x3, 0x2, 0xfe, 0x0, 0xff, 0x3c, 0x1f, 0x9, 0xe6, 0x1, 0x5, 0xff}, {0x4, 0x81, 0x2, 0x9, 0x6, 0x7, 0xb3, 0x6, 0x40, 0x9, 0x5d, 0xf7, 0x3}, {0xb5f, 0x7e6, 0x1f, 0x76, 0x8e, 0x7f, 0x2, 0x0, 0x6, 0x7f, 0xf1, 0x7f, 0x5}], 0x20}) 13:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xef000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:05 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(aegis128l-aesni,sha3-512-ce)\x00'}, 0xffffffffffffffea) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="cbc7f6028d45e0f82c599412b75356b6", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890339fb4c7d", 0x20}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000000c0)={'icmp\x00'}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, 0x0, 0xffffffffffffff09, 0x8080) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) 13:34:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000500"}) [ 1440.862908][T23965] IPVS: ftp: loaded support on port[0] = 21 [ 1440.895243][T23962] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:05 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x8000) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="00c6dccbf2786c249186131380f3a845f3e028fd365d8b64b9cf4cf6e03efc79cc09a9ebce2385c3132fc0a7d13bbd3e274bccfd7e7eaa1e4169d356c73dcf4b33417950d257477c4a22f6ed61ca42c929055f5a0f2eff4d9c270af6bfb22ff0d1aae1db309921f4ea3e5fd36ee1067b72272e7cf75212cd47541755f2070014f5109dcc4487182cdb81f8e59dff338aa6a3091a77d6a4c468fef33dcb9f8557fa2d5b971b9c82967fb9a65b03c50dfffb8c84bd719fc11fa72bfe5e22e3407580e27ff60b0e68a4433c701693c4d914c341080383f5b51a6efd977a3a565697d6960d00"/237], 0xed) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_open_procfs(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x7) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x810, r4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000280)='./file0/file0\x00', 0x0) [ 1440.981466][T23962] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1441.069560][T23962] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000000000600"}) 13:34:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xf5ffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1441.922165][T24002] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1441.948960][T24002] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1441.988630][T24002] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1442.090538][T23965] IPVS: ftp: loaded support on port[0] = 21 [ 1442.129844][T14574] tipc: TX() has been purged, node left! [ 1442.135929][T14574] tipc: TX() has been purged, node left! [ 1442.147914][T14574] tipc: TX() has been purged, node left! [ 1442.179523][T14574] tipc: TX() has been purged, node left! 13:34:06 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xff00}, 0x2a0}) 13:34:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x20, 0x1, "e03c858df7ba727da4e8105da1db31270e4839"}) 13:34:06 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 13:34:06 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x8000) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="00c6dccbf2786c249186131380f3a845f3e028fd365d8b64b9cf4cf6e03efc79cc09a9ebce2385c3132fc0a7d13bbd3e274bccfd7e7eaa1e4169d356c73dcf4b33417950d257477c4a22f6ed61ca42c929055f5a0f2eff4d9c270af6bfb22ff0d1aae1db309921f4ea3e5fd36ee1067b72272e7cf75212cd47541755f2070014f5109dcc4487182cdb81f8e59dff338aa6a3091a77d6a4c468fef33dcb9f8557fa2d5b971b9c82967fb9a65b03c50dfffb8c84bd719fc11fa72bfe5e22e3407580e27ff60b0e68a4433c701693c4d914c341080383f5b51a6efd977a3a565697d6960d00"/237], 0xed) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_open_procfs(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x7) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x810, r4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000280)='./file0/file0\x00', 0x0) [ 1442.301847][T24014] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1442.317621][T24014] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1442.333525][T24014] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xf81f0200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:06 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000fffffdfd00"}) [ 1442.669799][T24030] IPVS: ftp: loaded support on port[0] = 21 13:34:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="6434da43a394807f529a29d4a6414a31f33d1f0383fa5498080f0fa2ea86f6b5f6b2eeeb9e25529b317105a15084e07a9aaa05174a8be9704e6b997c5abd241a9e93a4a3275c169c048819c20c9b163352a56d54440bff28657a616ebdce324506b4bc88dd2d65bdaabf81ae12035e6d0357032cd6bdb5bd5f6628ec079c39378b225067e35451066431d3690ce579b0deb5087a996c971d8e16cc64dc8e27d91f9ba01af1a19dcddc1144dc81b5490b029c207486d39798b219bc195112c8ecc91f661178e20acc2bab0c7f5f5ba0153fe01ed30da867e3b81c06f3a17675bf29fa9d392ceeaa8a63", 0xe9, 0x7}, {&(0x7f00000002c0)="3c470795f12c6ec85edb98fcc0fb0ad9136549d6b9496066f35973b777918cd1b940903030da50c0e983aa238288a180a7015573f6cd1c6bacdd05296b197c49c2cd08f0252af5925173cdb1622c85b8031f9dcdbb585a0fdbdff2ceade2f514b564af5f1349c170aeb2d57490ede60dc254285a1fe301d3e85df6b2499b466e02795efe2c69ce0351e670a1cc7757b8d4701fde6846fce4b1b0a3ce625e274636687d327829f2e71c3e36c4b97a4ea492f1b784d20d6a6a5a7ffcc6bc29e6321307489200abd39f57ea7646638d3b63d4a60a6ad032", 0xd6, 0xfffffffffffffffc}], 0x800000, &(0x7f0000000100)={[{@errors_remount='errors=remount-ro'}], [{@pcr={'pcr', 0x3d, 0x40}}, {@measure='measure'}, {@dont_hash='dont_hash'}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:07 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000ff00"}) 13:34:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xfc010000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:07 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000200"}) [ 1443.333197][T24047] jfs: Unrecognized mount option "pcr=00000000000000000064" or missing value 13:34:07 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000300"}) [ 1443.418925][T24061] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1443.429278][T24061] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1443.446050][T24061] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1443.457573][T24037] IPVS: ftp: loaded support on port[0] = 21 13:34:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1443.639486][T24053] jfs: Unrecognized mount option "pcr=00000000000000000064" or missing value 13:34:09 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x1000000}, 0x2a0}) 13:34:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xfdffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) 13:34:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000400"}) 13:34:09 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000000000000000000000004f0000000000"], 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000002c00010700"/20, @ANYRES32=r6, @ANYBLOB="f7ffffff000000000300000008000100753332000c000200150098280200e200"], 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1444.869650][T24100] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1444.902124][T24100] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1444.912345][T24108] IPVS: ftp: loaded support on port[0] = 21 [ 1444.988293][T24100] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1445.004757][T24104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1445.078254][T24111] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 13:34:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000500"}) 13:34:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r1) fadvise64(r1, 0x6, 0x7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 13:34:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000600"}) 13:34:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xff000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/igmp6\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB="44a573fa5f7d70547b0000000000008b0000000084cdbbcc273eaa350a2bbad96638366441ec168f65f75bd3a09e4347f8e94ffa7aa4fe5d3cf8de9d638023c28e02b914ad82eeb0bc490000000000000000", @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r6, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', r6}) sendmsg$xdp(r2, &(0x7f00000007c0)={&(0x7f00000005c0)={0x2c, 0x2, r7, 0x28}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000600)="e267c2dc1abefcc0f11363d47fdcc6d96181ba16037a3220207f75c79c3e6403247c9a2bc41197dd5638937292f1e00a78286d82c20deb86481ef70af9de5573746ef1e4f8ef7eddabaff5dcbd6308bca18e0e42feb5f1c154ddbe47a56979c85187a3af3abe0ddac44ed8fd09fcb86e5cdc20e64c274d87000dc26e435551721e3fed6efc3bae68d148db", 0x8b}, {&(0x7f00000006c0)="cebae3c20c9609a7b42cf3964ca7ef368d65929be42a32c127e66613ed88131ba3010ce2306b18d5cf25027760c7ddb668b39f00d29bc598cc660f29c49ab264078b45294b6477752fb1a90ea6ba42c10182089c959a87cbff268d3fcc5c20312b2239c7cda68f142a0d8b607fe971334188c5d500213e322388bd597394a0d91b828a690b22cee8d634aeb9029314a894db442e54d878006a8323fd6e129a4d6421fab996cff5281d3577fc8179377c870bd4188afd13", 0xb7}], 0x2, 0x0, 0x0, 0x20000000}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x90009427, &(0x7f0000000040)) [ 1445.961057][T24140] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1445.980489][T24140] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1446.003427][T24140] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1446.295060][T24108] IPVS: ftp: loaded support on port[0] = 21 13:34:10 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x2000000}, 0x2a0}) 13:34:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) exit_group(0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @broadcast}, &(0x7f0000000080)=0xc) 13:34:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\a\x00'}) 13:34:11 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000140)='\xf9\x9boxnetp\x00Ru\xba\xb0_z\xe07ci\x95\xa7;\x0e\x1c\x9a$', 0x9) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readahead(r0, 0x0, 0x0) 13:34:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xff0f0000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1446.842551][T24171] IPVS: ftp: loaded support on port[0] = 21 [ 1446.911942][T24169] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:11 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) epoll_create1(0x0) fanotify_mark(r2, 0x65, 0x0, 0xffffffffffffffff, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46802) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000200)={0x2, r5}) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r6, 0x82, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) r7 = open(&(0x7f00003b6ff8)='./file1\x00', 0x10000000080040, 0x0) fcntl$setlease(r7, 0x400, 0x0) sendmsg$FOU_CMD_ADD(r7, 0x0, 0x4000000) 13:34:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\b\x00'}) [ 1446.992224][T24169] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:34:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x990000, 0x9, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x0, 0x0, [], @p_u32=&(0x7f0000000000)=0x2}}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0xe622b82c580d0467, 0x7, 0x0, 0x43, 0x101, &(0x7f00000001c0)="c0b4bbfde390e5b64e7cbdc0c40c728a3716714319d260572a12f80a1cc11d82cdccaa5aa68bc45c812ea020aaabf8abc7d0762b735b1662435fa4a8d433cb0de034cd"}) [ 1447.042684][T24169] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1447.248214][T14574] tipc: TX() has been purged, node left! 13:34:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000300"}) 13:34:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) pipe(&(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r6, 0x0, 0x0}, 0x100000171) [ 1447.428201][T14574] tipc: TX() has been purged, node left! [ 1447.489322][T24190] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1447.511524][T24190] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1447.543243][T24190] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xff1f0200, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1447.618528][T14574] tipc: TX() has been purged, node left! 13:34:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x5, 0x1, 0x80, 0x0, 0x1ff, 0xf899d7c24022821d, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xee, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1480, 0x8000, 0x2, 0x4, 0x5758, 0x20, 0x6}, r2, 0x7, 0xffffffffffffffff, 0x8e3d1a2475f91260) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, 0x0}, 0x20) r4 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="3eb33a541683e25e6d1a767a85ce01f250b4b4cb5eaab9e41ecd75a602ba578390a383529e901b33dedb97d9f6802fea73eeee25b4afa2103fe71a237157aeae359f868b6c00b0550363eb7a8164879a3aaeaed88d4bfbb74a9e8a736f37bf95ae60be690ef4bd0079d700f99ddc51cf6676a13dabd13dfa678e61c2feb485d8cc4fb8c62d3b372515b7f16b179f2cd62d6e88cbfcf5fc876fb68d1dc9debf16c66fd66d654eba977cfe10873588f509e4cd67ac49da10c841ab9cf17830dc9e90cc9509f1434ba2", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r7, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r7, 0x2}, &(0x7f00000001c0)=0x8) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r3, 0x0, 0x0}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, &(0x7f0000000240), 0x2) [ 1447.788192][T14574] tipc: TX() has been purged, node left! [ 1447.907900][T24171] IPVS: ftp: loaded support on port[0] = 21 [ 1447.931712][T24204] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1447.951286][T24204] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1447.978274][T14574] tipc: TX() has been purged, node left! [ 1447.986430][T24204] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1448.103364][T14574] tipc: TX() has been purged, node left! [ 1448.562144][T24224] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1448.581919][T24224] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1448.611091][T24224] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:13 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x3000000}, 0x2a0}) 13:34:13 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000500"}) 13:34:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) read$usbfs(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\xc3\x19\x05\x00', 0x12}) close(r0) 13:34:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r5, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r8 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) r10 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r10, &(0x7f0000000300)) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r8, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={r11, @remote, @loopback}, 0xc) ioctl$FICLONE(r5, 0x40049409, r7) r12 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000480)={'team0\x00', r11}) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)={0x124, r12, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r9}, {0xbc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0xffffffffffffff17, 0x4, 0x1}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}]}, 0x124}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r17, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r17, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r21}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r21, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r21, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r25}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r22, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r25, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r24, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r25, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r26, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r29, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r29, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000480)={0x0, @ethernet={0x306, @local}, @xdp={0x2c, 0x4, r29, 0xa}, @rc={0x1f, {0x8, 0x1, 0x7, 0xd1, 0x6d, 0xff}, 0x1f}, 0xffff, 0x0, 0x0, 0x0, 0x2b8, &(0x7f0000000440)='bridge0\x00', 0x100, 0x3, 0xff}) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r34}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r34, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r33, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r34, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) r36 = socket$inet6_udp(0xa, 0x2, 0x0) r37 = fcntl$dupfd(r36, 0x0, r35) ioctl$sock_SIOCGIFBR(r37, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r37, 0x29, 0x22, &(0x7f0000000600)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x402000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="3c030000", @ANYRES16=r12, @ANYBLOB="020028bd7000fcdbdf250100000008000100", @ANYRES32=r17, @ANYBLOB="2801020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e746572400000000000ffffff7f00000000080003b4b97265b6e37c9fd90700030000000800040006520020080001005724c9eaace7465d910e92516f8fc37870d615e15af2754623f4bb5b3eb3152bec4055876921297d2f757e3f9d1cc422992ab712af2d2ceedfdd9160a2f66c1f1b1dc58159d2bdea3301a361d782cbbc77265d58f5bd0d9277", @ANYRES32=r30, @ANYBLOB="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", @ANYRES32=r34, @ANYBLOB="080007000000000008000100", @ANYRES32=r38, @ANYBLOB="9000020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x33c}, 0x1, 0x0, 0x0, 0x811}, 0x48a0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000002900210400"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c0080eb8600000075701000200002001c0002000500000000000800050062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792ac1f351b2483d67b19c323679afde2698ebe5f8ecad69aac1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffefffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1449.276486][T24245] IPVS: ftp: loaded support on port[0] = 21 13:34:13 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000600"}) [ 1449.378192][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1449.384046][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1449.421663][T24252] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:13 executing program 5: mq_unlink(&(0x7f0000000080)='keyring vmnet0@!:+\'*\x00') ftruncate(0xffffffffffffffff, 0x208200) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1703d66f4b2f3305, @perf_config_ext={0x9745, 0x85b}, 0x20230, 0xffffffff, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002abd7000fedbdf2505000000100001006e657464657673696d000000100002006e657464657673696d300000083bcc000300020000008729179dd8533d5969e8a4001de20400000000000000a12a2d70c536a468ac3ff3ae176fdd86538299ad0ad2ba8e4da5906a6c830ed5317f7267909001201bcaa008399f772b66"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xfffe, 0x0, 0x1, 0xa7}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)=0x6) sendto$inet6(r2, &(0x7f0000000300)="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", 0x218, 0x8000, 0x0, 0x0) close(r2) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) [ 1449.448125][T24252] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1449.537442][T24252] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1449.654645][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:34:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8923, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) [ 1450.018204][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.024031][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1450.029805][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.035561][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:34:14 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\a\x00'}) 13:34:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffff0f00, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x12, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x0}, 0x6c) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000000)=0x2) 13:34:14 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000ff00"}) [ 1450.658205][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.664072][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1450.750037][T24250] IPVS: ftp: loaded support on port[0] = 21 [ 1450.806533][T24296] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1450.832483][T24296] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1450.833237][T24277] ýy+¿[õÿóö: renamed from lo [ 1450.860234][T24296] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4000000}, 0x2a0}) [ 1451.183450][T24296] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1451.197295][T24296] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1451.206988][T24296] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:15 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000100"}) 13:34:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00'}, &(0x7f00000000c0)=0x44) 13:34:15 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000001440)=[{&(0x7f0000000440)="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", 0x200}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:34:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80}, 0x485}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000001c0)={0x9d0000, 0x7, 0x0, r4, 0x0, &(0x7f0000000100)={0x0, 0x9, [], @p_u8=&(0x7f00000000c0)=0x7}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r1) r8 = openat(r5, &(0x7f0000000200)='./file0\x00', 0x1, 0x88) ioctl$TUNSETVNETBE(r8, 0x400454de, &(0x7f0000000240)) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r7, 0xc0305302, &(0x7f0000000000)={0x60, 0x0, 0x3f, 0x7fff, 0x1, 0x7}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffffefff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f000013e000)={0x0, 0x0, {0x1, 0x0, 0x0, 0x0, 0x80000000}}) 13:34:15 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xffffffa7}], 0x1, 0x1) splice(r2, 0x0, r0, 0x0, 0x10000, 0x0) [ 1451.708469][T24324] IPVS: ftp: loaded support on port[0] = 21 13:34:16 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000200"}) 13:34:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1451.861675][T24340] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1451.869963][T24340] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1451.883279][T24340] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:16 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_thread_area(0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) shmctl$IPC_RMID(0x0, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x1, 0x0, 0x0, r0}, 0x2, 0x7}) 13:34:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1452.793923][T24324] IPVS: ftp: loaded support on port[0] = 21 13:34:17 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x5000000}, 0x2a0}) 13:34:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000300"}) 13:34:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffffff7f, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:17 executing program 0: 13:34:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xffffffff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r6}}, 0x48) recvfrom$rxrpc(r0, &(0x7f0000000380)=""/162, 0xa2, 0x40000000, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @local, 0x4}}, 0x24) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x3, 0x86, "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", 0x20, 0x20, 0x0, 0x16, 0xf1, 0x52, 0x4, 0x1}, r6}}, 0x120) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x18) [ 1453.062413][T24393] IPVS: ftp: loaded support on port[0] = 21 13:34:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000100100000100"/24], 0x18}}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:34:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000400"}) [ 1453.248581][T24399] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1453.255539][T24399] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1453.277011][T24399] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1453.544407][T24416] print_req_error: 1011 callbacks suppressed [ 1453.544433][T24416] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.544556][ T2503] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1453.551365][T24415] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.569023][ T2503] buffer_io_error: 983 callbacks suppressed [ 1453.569036][ T2503] Buffer I/O error on dev loop3p6, logical block 4080, async page read [ 1453.574821][T24418] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.585750][T24417] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.591745][T24419] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.608840][ T2503] blk_update_request: I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1453.626269][T24414] blk_update_request: I/O error, dev loop3, sector 32752 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.634384][ T2503] Buffer I/O error on dev loop3p5, logical block 33008, async page read [ 1453.646129][T24399] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 1453.657465][T24417] blk_update_request: I/O error, dev loop3, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.681823][ T2502] blk_update_request: I/O error, dev loop3, sector 32640 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1453.695739][ T2502] Buffer I/O error on dev loop3p4, logical block 4080, async page read [ 1453.706758][ T2502] Buffer I/O error on dev loop3p5, logical block 33022, async page read [ 1453.715524][ T2503] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 1453.723627][ T2503] Buffer I/O error on dev loop3p4, logical block 4094, async page read [ 1453.732535][ T2503] Buffer I/O error on dev loop3p2, logical block 33008, async page read [ 1453.732642][T24416] Buffer I/O error on dev loop3p6, logical block 4094, async page read [ 1453.741132][ T2503] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 1453.749426][T24416] Buffer I/O error on dev loop3p5, logical block 1, async page read [ 1453.778172][T14574] tipc: TX() has been purged, node left! [ 1453.928539][T14574] tipc: TX() has been purged, node left! [ 1453.976893][T24393] IPVS: ftp: loaded support on port[0] = 21 [ 1454.009564][T14574] tipc: TX() has been purged, node left! [ 1454.015597][T14574] tipc: TX() has been purged, node left! [ 1454.138214][T14574] tipc: TX() has been purged, node left! [ 1454.278216][T14574] tipc: TX() has been purged, node left! 13:34:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000100100000100"/24], 0x18}}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:34:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x111440) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0xe2) accept4$llc(r3, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x80c00) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000200)={0x0, 0x7a, 0x42}, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)="e6f63290383db8a5c0c9a2207cc96f8dbd37301e4d2c7a37b9c7b319697565dfda76d500e46d765885cee6cece34b1194cd217bdf851aa8586e905c458603c3fa42d0c586934799bd0da291828b99351f2d4805518a259b1ca0120f5ca1d057b7d04677f8d485fca80a3b012ed515d66f047e144cafc11cb54ca", &(0x7f0000000340)=""/66) 13:34:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000500"}) 13:34:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffffff97, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000100100000100"/24], 0x18}}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:34:19 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6000000}, 0x2a0}) [ 1454.871827][T24448] IPVS: ftp: loaded support on port[0] = 21 [ 1454.975751][T24451] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000000600"}) 13:34:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x4, 0x2, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd, 0x9, 0x10000}, 0x0, 0xb, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000200)={0x0, 0x8, 0x8, [], &(0x7f00000001c0)=0x4}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000080)=""/125) [ 1455.003618][T24451] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:34:19 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) epoll_create1(0x0) fanotify_mark(r2, 0x65, 0x0, 0xffffffffffffffff, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46802) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000200)={0x2, r5}) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r6, 0x82, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) setxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', 0x0, &(0x7f0000000340)={{}, {}, [{0x2, 0x3}], {}, [{}, {}], {0x10, 0x7}, {0x20, 0x2}}, 0x3c, 0x3) r7 = open(&(0x7f00003b6ff8)='./file1\x00', 0x10000000080040, 0x0) fcntl$setlease(r7, 0x400, 0x0) sendmsg$FOU_CMD_ADD(r7, 0x0, 0x4000000) [ 1455.081530][T24451] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:19 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f45344600000000da010000ffffffff00380200026a873ee557d9e9dba1de45a5e426ce9fa7351d52846889aec5e4224028e8f12c8f4891c82e2db10bfc1dcddcd890a2"], 0x44) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:34:19 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\a\x00'}) 13:34:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x80000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1455.556678][T24451] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 13:34:20 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f45344600000000da010000ffffffff00380200026a873ee557d9e9dba1de45a5e426ce9fa7351d52846889aec5e4224028e8f12c8f4891c82e2db10bfc1dcddcd890a2"], 0x44) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:34:20 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\b\x00'}) 13:34:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/21, 0x15) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200043, 0x0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x4, 0x0, 0x6, 0x0, 0xdd, 0xfb, &(0x7f00000001c0)="a880e6772cc4c4bb4bb6c401fa09b34bbb010be3bce78af4291bb916a2a5c06386160864eead4e50f952232607cd39e7d653788cc5a8f1228457d8831da915d9b898ec9f614f0cf6dbfc4867f5bdb64e11a8c3ed9196979cbfb6bb8ac7ec0c7ad239c4cc13cf5cb60dc0e01d48a8471e667b455a85f9e95e49a09dd814d1c8a3ab658aa3e1a5b3dee92eb997c4234ac0459849de273f9b341d2ec33d262b768af85b601bf1d0128341ba7a506328bae28e303c0018e3ed7f982ed292bd4a6bff72d5a02010bab44bb2395ae2b9b30eed3dc32751eccf8afdd835ef43ea"}) [ 1455.841452][T24489] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1455.879950][T24489] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1455.909539][T24489] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffffffc9, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:20 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f45344600000000da010000ffffffff00380200026a873ee557d9e9dba1de45a5e426ce9fa7351d52846889aec5e4224028e8f12c8f4891c82e2db10bfc1dcddcd890a2"], 0x44) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1456.143346][T24448] IPVS: ftp: loaded support on port[0] = 21 [ 1456.499765][T24518] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1456.539686][T24518] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:34:20 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7000000}, 0x2a0}) 13:34:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f00000001c0)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:20 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00fffffdfd00"}) [ 1456.556338][T24518] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1456.764746][T24532] IPVS: ftp: loaded support on port[0] = 21 13:34:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x128}}, 0x0) 13:34:21 executing program 5: r0 = perf_event_open(&(0x7f0000001200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x362, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') preadv(r1, &(0x7f00000017c0), 0x1a2, 0x0) 13:34:21 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000ff00"}) 13:34:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00220000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) [ 1457.040008][T24539] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1457.049980][T24539] loop3: p1 could not be added: 12 [ 1457.059113][T24539] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1457.151120][T24539] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xffffffe4, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:21 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x1f, 0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000], 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e21, @remote}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:34:21 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00fdfdffff00"}) 13:34:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="00a5d1af12000000477e9677ab7ebf95e4d6e1d9942a329a0871034ecb2441019f310e36c7367dd1aa00b634e1810b1f0e0e4e9fe29be43e51ca822919c3ad00003647b8ea3fc82251eb2b622df22af67a20d400007700002d86b1e11e23c6a11280eec4090b400967d74101d9db32d8467b0abe0c9c0000000000000000c0456eb02377358018b5badf6c66eac0d076ccd3f000e9a8d85ecc86e7e14c0f79df4270"], &(0x7f00000000c0)) 13:34:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000100"}) [ 1457.928844][T24574] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1458.023988][T24574] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1458.095857][T24574] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1458.163211][T24532] IPVS: ftp: loaded support on port[0] = 21 [ 1458.459461][T24591] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1458.472406][T24591] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1458.484261][T24591] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:23 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x8000000}, 0x2a0}) 13:34:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x141}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff5f, 0x0, 0xffffff32}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 13:34:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000200"}) 13:34:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xfffffff5, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x9000, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x10, &(0x7f0000000080)={&(0x7f00000001c0)=""/233, 0xe9, r3}}, 0x10) 13:34:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000300"}) [ 1459.076196][T24621] IPVS: ftp: loaded support on port[0] = 21 [ 1459.091629][T24606] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1459.113320][T24606] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1459.145033][T24606] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1459.168891][T14574] tipc: TX() has been purged, node left! [ 1459.183523][T14574] tipc: TX() has been purged, node left! 13:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/21, 0x15) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200043, 0x0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x4, 0x0, 0x6, 0x0, 0xdd, 0xfb, &(0x7f00000001c0)="a880e6772cc4c4bb4bb6c401fa09b34bbb010be3bce78af4291bb916a2a5c06386160864eead4e50f952232607cd39e7d653788cc5a8f1228457d8831da915d9b898ec9f614f0cf6dbfc4867f5bdb64e11a8c3ed9196979cbfb6bb8ac7ec0c7ad239c4cc13cf5cb60dc0e01d48a8471e667b455a85f9e95e49a09dd814d1c8a3ab658aa3e1a5b3dee92eb997c4234ac0459849de273f9b341d2ec33d262b768af85b601bf1d0128341ba7a506328bae28e303c0018e3ed7f982ed292bd4a6bff72d5a02010bab44bb2395ae2b9b30eed3dc32751eccf8afdd835ef43ea"}) [ 1459.221088][T14574] tipc: TX() has been purged, node left! [ 1459.251385][T14574] tipc: TX() has been purged, node left! 13:34:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x8}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = fcntl$getown(r1, 0x9) sched_setparam(r4, &(0x7f00000000c0)=0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$RTC_WKALM_SET(r7, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x9, 0x24, 0x17, 0xb, 0x7, 0x2, 0x4, 0x108}}) [ 1459.275427][T14574] tipc: TX() has been purged, node left! 13:34:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xfffffffd, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000400"}) 13:34:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x111440) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0xe2) accept4$llc(r3, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x80c00) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000200)={0x0, 0x7a, 0x42}, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)="e6f63290383db8a5c0c9a2207cc96f8dbd37301e4d2c7a37b9c7b319697565dfda76d500e46d765885cee6cece34b1194cd217bdf851aa8586e905c458603c3fa42d0c586934799bd0da291828b99351f2d4805518a259b1ca0120f5ca1d057b7d04677f8d485fca80a3b012ed515d66f047e144cafc11cb54ca", &(0x7f0000000340)=""/66) [ 1459.850581][T24646] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1459.882315][T24646] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1459.896117][T24646] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1460.030943][T24621] IPVS: ftp: loaded support on port[0] = 21 [ 1460.099011][T24656] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1460.108471][T24656] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1460.135500][T24656] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xa000000}, 0x2a0}) [ 1460.919552][T24679] IPVS: ftp: loaded support on port[0] = 21 [ 1461.334240][T24679] IPVS: ftp: loaded support on port[0] = 21 13:34:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r5, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r8 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={r9, @loopback, @remote}, 0xc) r10 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r10, &(0x7f0000000300)) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r8, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={r11, @remote, @loopback}, 0xc) ioctl$FICLONE(r5, 0x40049409, r7) r12 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000480)={'team0\x00', r11}) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x404001}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)={0x124, r12, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r9}, {0xbc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0xffffffffffffff17, 0x4, 0x1}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}]}, 0x124}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r17, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r17, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r21}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r21, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r21, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r25}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r22, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r25, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r24, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r25, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r26, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r29, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r29, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000480)={0x0, @ethernet={0x306, @local}, @xdp={0x2c, 0x4, r29, 0xa}, @rc={0x1f, {0x8, 0x1, 0x7, 0xd1, 0x6d, 0xff}, 0x1f}, 0xffff, 0x0, 0x0, 0x0, 0x2b8, &(0x7f0000000440)='bridge0\x00', 0x100, 0x3, 0xff}) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r32, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r34}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r31, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r34, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r33, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r34, @ANYBLOB="ecff120000000000004116d70000de"], 0x24}}, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) r36 = socket$inet6_udp(0xa, 0x2, 0x0) r37 = fcntl$dupfd(r36, 0x0, r35) ioctl$sock_SIOCGIFBR(r37, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r37, 0x29, 0x22, &(0x7f0000000600)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x402000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="3c030000", @ANYRES16=r12, @ANYBLOB="020028bd7000fcdbdf250100000008000100", @ANYRES32=r17, @ANYBLOB="2801020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e746572400000000000ffffff7f00000000080003b4b97265b6e37c9fd90700030000000800040006520020080001005724c9eaace7465d910e92516f8fc37870d615e15af2754623f4bb5b3eb3152bec4055876921297d2f757e3f9d1cc422992ab712af2d2ceedfdd9160a2f66c1f1b1dc58159d2bdea3301a361d782cbbc77265d58f5bd0d9277", @ANYRES32=r30, @ANYBLOB="5801020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000010000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004000800870605000000ff0708057f000000dc0006060300000002000f0200000000ff010001030000000300046e0800000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r34, @ANYBLOB="080007000000000008000100", @ANYRES32=r38, @ANYBLOB="9000020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x33c}, 0x1, 0x0, 0x0, 0x811}, 0x48a0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="500000002900210400"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000c0080eb8600000075701000200002001c0002000500000000000800050062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792ac1f351b2483d67b19c323679afde2698ebe5f8ecad69aac1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:26 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x20000000}, 0x2a0}) 13:34:26 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x5000000}, 0x2a0}) 13:34:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000500"}) 13:34:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x7f9390120c0e1cd3) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40000, 0x0) [ 1462.075697][T24713] IPVS: ftp: loaded support on port[0] = 21 [ 1462.083907][T24709] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1462.105628][T24709] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1462.165379][T24717] IPVS: ftp: loaded support on port[0] = 21 [ 1462.230691][T24709] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000000000600"}) [ 1462.271811][T14574] tipc: TX() has been purged, node left! [ 1462.292702][T14574] tipc: TX() has been purged, node left! [ 1462.406992][T14574] tipc: TX() has been purged, node left! [ 1462.431723][T14574] tipc: TX() has been purged, node left! 13:34:26 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1462.500667][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1462.506787][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.513007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1462.519561][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.529828][T14574] tipc: TX() has been purged, node left! 13:34:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffc52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = getpgid(r1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000080)={r6, 0xffffffffffffffff, 0x826d}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x6800, 0x0) ioctl$EVIOCGABS3F(r7, 0x8018457f, &(0x7f00000001c0)=""/210) 13:34:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x85ffffffff, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1462.842774][T24716] IPVS: ftp: loaded support on port[0] = 21 13:34:27 executing program 2: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @multicast1}, {0x306, @local}, 0x8, {0x2, 0x4e24, @rand_addr=0xfffff801}, 'lapb0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1463.138352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1463.144299][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1463.233735][T24759] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1463.253028][T24759] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1463.312138][T24759] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1463.538225][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1463.544208][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:34:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x5, 0x1, 0x80, 0x0, 0x1ff, 0xf899d7c24022821d, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xee, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1480, 0x8000, 0x2, 0x4, 0x5758, 0x20, 0x6}, r2, 0x7, 0xffffffffffffffff, 0x8e3d1a2475f91260) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, 0x0}, 0x20) r4 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="3eb33a541683e25e6d1a767a85ce01f250b4b4cb5eaab9e41ecd75a602ba578390a383529e901b33dedb97d9f6802fea73eeee25b4afa2103fe71a237157aeae359f868b6c00b0550363eb7a8164879a3aaeaed88d4bfbb74a9e8a736f37bf95ae60be690ef4bd0079d700f99ddc51cf6676a13dabd13dfa678e61c2feb485d8cc4fb8c62d3b372515b7f16b179f2cd62d6e88cbfcf5fc876fb68d1dc9debf16c66fd66d654eba977cfe10873588f509e4cd67ac49da10c841ab9cf17830dc9e90cc9509f1434ba2", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r7, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r7, 0x2}, &(0x7f00000001c0)=0x8) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r3, 0x0, 0x0}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, &(0x7f0000000240), 0x2) [ 1463.628705][T24756] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1463.644666][T24756] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1463.662857][T24756] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x5, 0x1, 0x80, 0x0, 0x1ff, 0xf899d7c24022821d, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xee, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1480, 0x8000, 0x2, 0x4, 0x5758, 0x20, 0x6}, r2, 0x7, 0xffffffffffffffff, 0x8e3d1a2475f91260) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, 0x0}, 0x20) r4 = open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="3eb33a541683e25e6d1a767a85ce01f250b4b4cb5eaab9e41ecd75a602ba578390a383529e901b33dedb97d9f6802fea73eeee25b4afa2103fe71a237157aeae359f868b6c00b0550363eb7a8164879a3aaeaed88d4bfbb74a9e8a736f37bf95ae60be690ef4bd0079d700f99ddc51cf6676a13dabd13dfa678e61c2feb485d8cc4fb8c62d3b372515b7f16b179f2cd62d6e88cbfcf5fc876fb68d1dc9debf16c66fd66d654eba977cfe10873588f509e4cd67ac49da10c841ab9cf17830dc9e90cc9509f1434ba2", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r7, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r7, 0x2}, &(0x7f00000001c0)=0x8) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r3, 0x0, 0x0}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r8, 0x112, 0x4, &(0x7f0000000240), 0x2) 13:34:28 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) 13:34:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r1, 0x406, r0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000080)=""/179) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RWRITE(r6, &(0x7f0000000280)={0xb, 0x77, 0x1, 0xc677}, 0xb) r7 = socket$rxrpc(0x21, 0x2, 0xa) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000006600070500"/20, @ANYRES32=r11, @ANYBLOB="ecff120000000000004116c30000de"], 0x24}}, 0x0) ioctl$sock_SIOCDELRT(r7, 0x890c, &(0x7f0000000200)={0x0, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, @nl=@unspec, @can={0x1d, r11}, 0x401, 0x0, 0x0, 0x0, 0x9, &(0x7f00000001c0)='veth1_to_team\x00', 0x1e, 0x4, 0x3}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1464.179003][T24788] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1464.204530][T24788] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1464.225674][T24788] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x8000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) pipe(&(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r6, 0x0, 0x0}, 0x100000171) 13:34:29 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000fffffdfd00"}) 13:34:29 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xff00}, 0x2a0}) 13:34:29 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x40000000}, 0x2a0}) 13:34:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x2000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1465.527812][T24816] IPVS: ftp: loaded support on port[0] = 21 [ 1465.643723][T24829] IPVS: ftp: loaded support on port[0] = 21 [ 1465.655280][T24820] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:30 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000ff00"}) [ 1465.684611][T24820] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1465.699833][T24820] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) pipe(&(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r6, 0x0, 0x0}, 0x100000171) 13:34:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x202008, &(0x7f00000000c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@smackfsroot={'smackfsroot', 0x3d, ',cgroupselinuxnodev'}}, {@permit_directio='permit_directio'}, {@context={'context', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r2}}]}) [ 1465.890034][T14574] tipc: TX() has been purged, node left! [ 1465.906280][T14574] tipc: TX() has been purged, node left! 13:34:30 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000200"}) [ 1465.981188][T14574] tipc: TX() has been purged, node left! [ 1466.008880][T14574] tipc: TX() has been purged, node left! 13:34:30 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000300"}) 13:34:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000640)={0x34, 0x0, &(0x7f00000005c0)}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0xa10000, 0x4, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9b0907, 0x8, [], @p_u32=&(0x7f0000000000)=0x5}}) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000100)={0x2, 0x1, 0xd, 0xc, 0x1c2, &(0x7f00000001c0)="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"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000680)={r1, 0x0, 0x0, 0x4}, 0x20) 13:34:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x8000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:30 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000400"}) [ 1466.535755][T24869] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1466.542826][T24869] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1466.585752][T24869] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1466.791182][T24829] IPVS: ftp: loaded support on port[0] = 21 13:34:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000200)={{0x2, 0x4e24, @empty}, {0x6, @local}, 0x41, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ifb0\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000100)={0x0, 0x411, 0x2}) ioctl$SNDRV_PCM_IOCTL_STATUS32(r1, 0x806c4120, &(0x7f0000000080)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000008c0)={0x9b0000, 0x7, 0x0, r6, 0x0, &(0x7f0000000880)={0x990a6e, 0x2, [], @value64=0x6}}) accept4$rose(r7, &(0x7f0000000900)=@short={0xb, @dev, @rose, 0x1, @netrom}, &(0x7f0000000940)=0x1c, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(r9, 0x4070aea0, &(0x7f0000000280)={[{0x3ba, 0x3, 0x2, 0xfe, 0x0, 0xff, 0x3c, 0x1f, 0x9, 0xe6, 0x1, 0x5, 0xff}, {0x4, 0x81, 0x2, 0x9, 0x6, 0x7, 0xb3, 0x6, 0x40, 0x9, 0x5d, 0xf7, 0x3}, {0xb5f, 0x7e6, 0x1f, 0x76, 0x8e, 0x7f, 0x2, 0x0, 0x6, 0x7f, 0xf1, 0x7f, 0x5}], 0x20}) 13:34:31 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x48000000}, 0x2a0}) 13:34:31 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000500"}) 13:34:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r4 = dup3(r3, r0, 0x100000) r5 = getpid() write$P9_RGETLOCK(r4, &(0x7f0000000080)={0x46, 0x37, 0x2, {0x1, 0x3, 0x1, r5, 0x28, 'GPL*ð0/,@-ppp1procem0md5sumppp1\\{proc'}}, 0x46) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="6434da43a394807f529a29d4a6414a31f33d1f0383fa5498080f0fa2ea86f6b5f6b2eeeb9e25529b317105a15084e07a9aaa05174a8be9704e6b997c5abd241a9e93a4a3275c169c048819c20c9b163352a56d54440bff28657a616ebdce324506b4bc88dd2d65bdaabf81ae12035e6d0357032cd6bdb5bd5f6628ec079c39378b225067e35451066431d3690ce579b0deb5087a996c971d8e16cc64dc8e27d91f9ba01af1a19dcddc1144dc81b5490b029c207486d39798b219bc195112c8ecc91f661178e20acc2bab0c7f5f5ba0153fe01ed30da867e3b81c06f3a17675bf29fa9d392ceeaa8a63", 0xe9, 0x7}, {&(0x7f00000002c0)="3c470795f12c6ec85edb98fcc0fb0ad9136549d6b9496066f35973b777918cd1b940903030da50c0e983aa238288a180a7015573f6cd1c6bacdd05296b197c49c2cd08f0252af5925173cdb1622c85b8031f9dcdbb585a0fdbdff2ceade2f514b564af5f1349c170aeb2d57490ede60dc254285a1fe301d3e85df6b2499b466e02795efe2c69ce0351e670a1cc7757b8d4701fde6846fce4b1b0a3ce625e274636687d327829f2e71c3e36c4b97a4ea492f1b784d20d6a6a5a7ffcc6bc29e6321307489200abd39f57ea7646638d3b63d4a60a6ad032", 0xd6, 0xfffffffffffffffc}], 0x800000, &(0x7f0000000100)={[{@errors_remount='errors=remount-ro'}], [{@pcr={'pcr', 0x3d, 0x40}}, {@measure='measure'}, {@dont_hash='dont_hash'}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x20020000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:31 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000004f80)=[{&(0x7f0000000400)="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", 0xff}, {&(0x7f0000004500)="186e42097fa92ba3e0ba5e5d564de4f724e6a5c298c05d48947d37db266002b59bcc5863b15bdc2984f15124118cb142dc2b59dc2ab3f963ef39e0d4d63c8ccf334414972bf008fd8b1a62a18a441db8fe596d3ce446fe231ee3fc26510563b3aa09717c059eed998f4b9530f4fdbeacf9f2afd83b1a4c5c29b633391d49dfb3d2b44581f87ed17f81f230bf35aa67405fe9eb20503d3b6e2f5c115e5a7da3f1a49df59b27a7ccc9e51dd9f147216b", 0xaf}, {&(0x7f00000045c0)="728a9b0a9cbcb05f1df70a106aa2a3e9cc69ead24baedef76164fee38102b40dd54a0b6170d44e44f7c51477db69572dac2a9d6916cefd74e5114d3f389d8547b358c52d27ead09da031e1e529d99f088c0482edb16d7fb01bbeb80a18c820921ade863b045078e5844cd4661a8be8054262ceef1f38d918945d9b95188ee75427cc5f000e8c205d19a401", 0x8b}, {&(0x7f0000004680)="e6c1c704ab7af798fc0ffafa19722fae5e5048d1bdf3f79a4d3256cca1a8ae46c6292f8b1a088416a5714870a1ec52a33a9db2dca6b060108b5f8753d701614c931d89a99368d24a4a9294e87c499f1ef06aab062bf08b3deebe0679be11ed9010bcaaec0991c81564e0aab8188b9e3fdc095a3ad16c6c161e52d2bf52ab3818c84d48b9a62c2f3e81b5c2ab20ec6dbf9a2cec8d848a7111dce14a44d53cb5250ddc31b9f068d9798fe90bdf9e0a08fcae75840fe341367cd55aa40546df68f7d4ffc512a26505402ea7a1a88ac69df32f31cc78d34fc43c1a43b4c3b403890bf11a1e836dec6b3acc1b", 0xea}, {&(0x7f0000004780)="0843191e6398236525d43276e392471decfcb29aec4a99976499797e1bf8750fd7e67a75a9690cb02e00e27f935fd1c8cd22471da159c87ae997d755ac90ac1a859fd22d6becc74c78511894dc4d6fd0a4a2ee709301643782d9e501dd8399e088433e78edfab35d8dccc1832b676a250819d3630502d6f733ed1758506090bddccaebea7df98e3208b5e6f86106fcbd7c3f49494e855fd8be05fc62b383c6bc1057320a772584d3f38959f4b4efdff4ff9f3f74dfade40b550af2040da07fef3d", 0xc1}, {&(0x7f0000002780)="f9fc81f72bd608d5a047665c41fbac", 0xf}, {&(0x7f00000027c0)="acb6af0a1c99af4bec27b1b0c582478a", 0x22f}, {&(0x7f0000004240)="22b6a04b9eacb9f46941dcfb9ab74a1ffda3337ca8b3a636053e19c76429e5dec0b97ec4e173519c729a47cb8e368c7c02000000000000008a93614d440f", 0x3e}, {&(0x7f0000004e00)="69171e4dda5b39b1868202aeecf9629b80939a5217dbe19542da3880e0037f3a0fbdd9f86512351087d86fcebab76bb12a312839e805e9338a43975f6064460ef9431b818555d4732aff3ff2a62e54", 0x4f}, {&(0x7f0000004e80)="7e2580dd54b77724abd6bfcaeecd3b49ae1d01386b2390151a091396b61f5a5741d1a8e9101f7ae6fc2a2c0f39ce915be9065ac81d5ceb509421b9eca63dd4ec899c6b29941d8fa91fe5d8d59693f8b10a865f91dcce8ed0b9e50612bf413be87f5960f1fb81d8b6f4dde21823c5296f6c6e9d975fca7912cb01308e4b7da36c63f7be9826b4036dc9891e41bc30d9857ec07ef05b5b131a4a805591be574fa38aa37f7d59992010ccda7178c3f8c92c4b623abfef4d5f80bf5fe775cdff7d10b8c7d7a0f82ce1b74f7a813bbe9eb6c448", 0xd1}], 0xa, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000007, 0x8001}, 0x3c) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000280)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x13) pipe(&(0x7f0000000040)) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r3 = accept$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) recvmmsg(r3, &(0x7f0000004c80)=[{{&(0x7f00000002c0)=@ipx, 0x80, &(0x7f0000003a40)=[{&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {0x0, 0xfffffffffffffecf}, {&(0x7f0000002800)=""/131, 0x83}, {&(0x7f00000028c0)=""/186, 0xba}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/192, 0xc0}], 0x9}, 0x8}, {{&(0x7f0000003b00)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003b80)=""/244, 0xf4}, {&(0x7f0000003c80)=""/51, 0x33}, {&(0x7f0000003cc0)=""/217, 0xd9}, {&(0x7f0000003dc0)=""/214, 0xd6}, {&(0x7f0000003ec0)=""/31, 0x1f}, {&(0x7f0000003f00)=""/11, 0xb}], 0x6, &(0x7f0000003fc0)=""/195, 0xc3}, 0x7}, {{&(0x7f00000040c0)=@sco, 0x80, &(0x7f0000004280)=[{&(0x7f0000004140)=""/175, 0xaf}, {&(0x7f0000004200)=""/24, 0x18}, {&(0x7f00000001c0)=""/37, 0x25}], 0x3, &(0x7f00000042c0)=""/113, 0x71}, 0x69}, {{&(0x7f0000004340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f0000004800), 0x0, &(0x7f0000004880)=""/59, 0x3b}, 0x4}, {{&(0x7f00000048c0)=@tipc=@id, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004940)=""/219, 0xdb}, {&(0x7f0000004a40)=""/210, 0xd2}, {&(0x7f0000004b40)=""/46, 0x2e}], 0x3, &(0x7f0000004bc0)=""/173, 0xad}, 0xef36}], 0x5, 0x1, &(0x7f0000004dc0)={0x0, 0x989680}) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f00000043c0)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032b95a73fb4eb3aff6d92852ddab6739a3e49babcf50449f9820c01a"]) close(0xffffffffffffffff) [ 1467.324518][T24896] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f00000004c0)=[{0x101}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 1467.373246][T24896] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1467.390178][T24911] IPVS: ftp: loaded support on port[0] = 21 13:34:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000000)=0x6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:31 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000600"}) [ 1467.449937][T24896] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:32 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000004f80)=[{&(0x7f0000000400)="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", 0xff}, {&(0x7f0000004500)="186e42097fa92ba3e0ba5e5d564de4f724e6a5c298c05d48947d37db266002b59bcc5863b15bdc2984f15124118cb142dc2b59dc2ab3f963ef39e0d4d63c8ccf334414972bf008fd8b1a62a18a441db8fe596d3ce446fe231ee3fc26510563b3aa09717c059eed998f4b9530f4fdbeacf9f2afd83b1a4c5c29b633391d49dfb3d2b44581f87ed17f81f230bf35aa67405fe9eb20503d3b6e2f5c115e5a7da3f1a49df59b27a7ccc9e51dd9f147216b", 0xaf}, {&(0x7f00000045c0)="728a9b0a9cbcb05f1df70a106aa2a3e9cc69ead24baedef76164fee38102b40dd54a0b6170d44e44f7c51477db69572dac2a9d6916cefd74e5114d3f389d8547b358c52d27ead09da031e1e529d99f088c0482edb16d7fb01bbeb80a18c820921ade863b045078e5844cd4661a8be8054262ceef1f38d918945d9b95188ee75427cc5f000e8c205d19a401", 0x8b}, {&(0x7f0000004680)="e6c1c704ab7af798fc0ffafa19722fae5e5048d1bdf3f79a4d3256cca1a8ae46c6292f8b1a088416a5714870a1ec52a33a9db2dca6b060108b5f8753d701614c931d89a99368d24a4a9294e87c499f1ef06aab062bf08b3deebe0679be11ed9010bcaaec0991c81564e0aab8188b9e3fdc095a3ad16c6c161e52d2bf52ab3818c84d48b9a62c2f3e81b5c2ab20ec6dbf9a2cec8d848a7111dce14a44d53cb5250ddc31b9f068d9798fe90bdf9e0a08fcae75840fe341367cd55aa40546df68f7d4ffc512a26505402ea7a1a88ac69df32f31cc78d34fc43c1a43b4c3b403890bf11a1e836dec6b3acc1b", 0xea}, {&(0x7f0000004780)="0843191e6398236525d43276e392471decfcb29aec4a99976499797e1bf8750fd7e67a75a9690cb02e00e27f935fd1c8cd22471da159c87ae997d755ac90ac1a859fd22d6becc74c78511894dc4d6fd0a4a2ee709301643782d9e501dd8399e088433e78edfab35d8dccc1832b676a250819d3630502d6f733ed1758506090bddccaebea7df98e3208b5e6f86106fcbd7c3f49494e855fd8be05fc62b383c6bc1057320a772584d3f38959f4b4efdff4ff9f3f74dfade40b550af2040da07fef3d", 0xc1}, {&(0x7f0000002780)="f9fc81f72bd608d5a047665c41fbac", 0xf}, {&(0x7f00000027c0)="acb6af0a1c99af4bec27b1b0c582478a", 0x22f}, {&(0x7f0000004240)="22b6a04b9eacb9f46941dcfb9ab74a1ffda3337ca8b3a636053e19c76429e5dec0b97ec4e173519c729a47cb8e368c7c02000000000000008a93614d440f", 0x3e}, {&(0x7f0000004e00)="69171e4dda5b39b1868202aeecf9629b80939a5217dbe19542da3880e0037f3a0fbdd9f86512351087d86fcebab76bb12a312839e805e9338a43975f6064460ef9431b818555d4732aff3ff2a62e54", 0x4f}, {&(0x7f0000004e80)="7e2580dd54b77724abd6bfcaeecd3b49ae1d01386b2390151a091396b61f5a5741d1a8e9101f7ae6fc2a2c0f39ce915be9065ac81d5ceb509421b9eca63dd4ec899c6b29941d8fa91fe5d8d59693f8b10a865f91dcce8ed0b9e50612bf413be87f5960f1fb81d8b6f4dde21823c5296f6c6e9d975fca7912cb01308e4b7da36c63f7be9826b4036dc9891e41bc30d9857ec07ef05b5b131a4a805591be574fa38aa37f7d59992010ccda7178c3f8c92c4b623abfef4d5f80bf5fe775cdff7d10b8c7d7a0f82ce1b74f7a813bbe9eb6c448", 0xd1}], 0xa, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000007, 0x8001}, 0x3c) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000280)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x13) pipe(&(0x7f0000000040)) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r3 = accept$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) recvmmsg(r3, &(0x7f0000004c80)=[{{&(0x7f00000002c0)=@ipx, 0x80, &(0x7f0000003a40)=[{&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {0x0, 0xfffffffffffffecf}, {&(0x7f0000002800)=""/131, 0x83}, {&(0x7f00000028c0)=""/186, 0xba}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/192, 0xc0}], 0x9}, 0x8}, {{&(0x7f0000003b00)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003b80)=""/244, 0xf4}, {&(0x7f0000003c80)=""/51, 0x33}, {&(0x7f0000003cc0)=""/217, 0xd9}, {&(0x7f0000003dc0)=""/214, 0xd6}, {&(0x7f0000003ec0)=""/31, 0x1f}, {&(0x7f0000003f00)=""/11, 0xb}], 0x6, &(0x7f0000003fc0)=""/195, 0xc3}, 0x7}, {{&(0x7f00000040c0)=@sco, 0x80, &(0x7f0000004280)=[{&(0x7f0000004140)=""/175, 0xaf}, {&(0x7f0000004200)=""/24, 0x18}, {&(0x7f00000001c0)=""/37, 0x25}], 0x3, &(0x7f00000042c0)=""/113, 0x71}, 0x69}, {{&(0x7f0000004340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f0000004800), 0x0, &(0x7f0000004880)=""/59, 0x3b}, 0x4}, {{&(0x7f00000048c0)=@tipc=@id, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004940)=""/219, 0xdb}, {&(0x7f0000004a40)=""/210, 0xd2}, {&(0x7f0000004b40)=""/46, 0x2e}], 0x3, &(0x7f0000004bc0)=""/173, 0xad}, 0xef36}], 0x5, 0x1, &(0x7f0000004dc0)={0x0, 0x989680}) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f00000043c0)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032b95a73fb4eb3aff6d92852ddab6739a3e49babcf50449f9820c01a"]) close(0xffffffffffffffff) 13:34:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80142, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1467.650053][T24919] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1467.673463][T24919] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1467.738371][T24919] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:32 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\a\x00'}) [ 1468.506785][T24911] IPVS: ftp: loaded support on port[0] = 21 13:34:33 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x4c000000}, 0x2a0}) 13:34:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x44000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000004e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 13:34:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) listxattr(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)=""/105, 0x69) io_setup(0x100000000000c333, &(0x7f0000000180)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r1, 0x48280) open(0x0, 0x400000, 0x10) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) creat(0x0, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPOEIOCSFWD(r5, 0x4008b100, &(0x7f0000000280)={0x18, 0x0, {0x4, @broadcast, 'team_slave_1\x00'}}) ftruncate(r3, 0x2007fff) lseek(r3, 0x0, 0x4) 13:34:33 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\b\x00'}) [ 1468.837512][ T27] audit: type=1804 audit(1577626473.161:206): pid=24967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1900/bus" dev="sda1" ino=17169 res=1 [ 1468.897365][ T27] audit: type=1804 audit(1577626473.201:207): pid=24967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1900/bus" dev="sda1" ino=17169 res=1 13:34:33 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000300"}) [ 1468.956771][T24969] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1468.966573][T24969] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1468.990329][ T27] audit: type=1804 audit(1577626473.201:208): pid=24967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1900/bus" dev="sda1" ino=17169 res=1 [ 1469.015576][T24969] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1469.037838][T24986] IPVS: ftp: loaded support on port[0] = 21 13:34:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000001c0)={0x10001, 0x2b13199c, 0x1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x10) 13:34:33 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x720, 0x800) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f00000000c0)={0x0, {0x5, 0xffffc2ed}}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2302"], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0xc) r8 = open(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r8, 0x40086602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r8, 0xc4c85513, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000100)={r7, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0x8c17, 0x0, 0xa7, 0x8}, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000100)={r7, 0x7ff}, 0x8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 1469.228373][ T27] audit: type=1804 audit(1577626473.221:209): pid=24967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1900/bus" dev="sda1" ino=17169 res=1 13:34:33 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000500"}) [ 1469.316478][T24991] QAT: Invalid ioctl [ 1469.376654][T24991] QAT: Invalid ioctl 13:34:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x90000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1469.415051][ T27] audit: type=1800 audit(1577626473.281:210): pid=24978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17329 res=0 13:34:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) getrusage(0xb2d998518d23f921, &(0x7f0000000080)) [ 1469.598913][ T27] audit: type=1804 audit(1577626473.301:211): pid=24978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1680/file0" dev="sda1" ino=17329 res=1 [ 1469.749920][T25012] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1469.757402][T25012] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1469.769505][ T27] audit: type=1804 audit(1577626474.101:212): pid=25015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1680/file0" dev="sda1" ino=17329 res=1 [ 1469.842967][T25012] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1469.903803][ T27] audit: type=1804 audit(1577626474.121:213): pid=25018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir796737792/syzkaller.Gd7t7U/1680/file0" dev="sda1" ino=17329 res=1 [ 1470.085879][T25025] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1470.092607][T25025] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1470.105519][T24986] IPVS: ftp: loaded support on port[0] = 21 [ 1470.120368][T25025] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:34 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x60000000}, 0x2a0}) 13:34:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000600"}) 13:34:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$DRM_IOCTL_SET_VERSION(r3, 0xc0106407, &(0x7f0000000000)={0x0, 0x8000, 0x9, 0x80}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) getrusage(0xb2d998518d23f921, &(0x7f0000000080)) 13:34:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x100000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1470.348683][T14574] tipc: TX() has been purged, node left! 13:34:34 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\a\x00'}) 13:34:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x2002, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, 0xfffffffffffffffd) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_FILES(r7, 0x3, 0x0, 0x0) r8 = fcntl$dupfd(r5, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x4, 0x4) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) dup2(r9, r1) r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r10, 0x4, 0x42000) fcntl$getownex(r10, 0x10, &(0x7f0000000040)) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x111103, 0x0) close(r11) [ 1470.406634][T25041] IPVS: ftp: loaded support on port[0] = 21 [ 1470.432686][T14574] tipc: TX() has been purged, node left! [ 1470.449721][T14574] tipc: TX() has been purged, node left! [ 1470.469692][T25040] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1470.487520][T25040] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1470.502883][T25040] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0xfed9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5010, 0x0, 0x0, 0x7, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) socket$pppoe(0x18, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1471.083615][T25041] IPVS: ftp: loaded support on port[0] = 21 13:34:36 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0xceda5000) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x80, 0x6}, 0xfffe, 0xfd}, 0xe) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe5, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r6 = open(0x0, 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) dup2(r6, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) r7 = open(0x0, 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x305) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, &(0x7f0000000300)=ANY=[], 0x6) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) 13:34:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "000000ff00"}) 13:34:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x200000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x80080) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000080)={0x0, 0xfff, 0x4, 0x3ff, 0x800}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000080)={0x5}) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000200)=@bpq0='bpq0\x00', 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000880)="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", 0x1fe, 0x2}], 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$VIDIOC_PREPARE_BUF(r10, 0xc058565d, &(0x7f0000000180)={0x5, 0x3, 0x4, 0x12, 0x90, {}, {0x0, 0x2, 0xff, 0x40, 0x7f, 0x7, "8ba64f6e"}, 0x6, 0x1, @offset=0x4, 0x452}) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 13:34:36 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x68000000}, 0x2a0}) [ 1472.427104][T25102] IPVS: ftp: loaded support on port[0] = 21 13:34:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000100"}) [ 1472.558830][T25105] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1472.578846][T25105] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1472.607490][T25105] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000200"}) 13:34:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x8553e062868c498, @perf_bp={0x0}, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 13:34:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000300"}) 13:34:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) [ 1472.888185][T14574] tipc: TX() has been purged, node left! 13:34:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000400"}) [ 1473.037761][ T27] audit: type=1804 audit(1577626477.361:214): pid=25120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1902/bus" dev="sda1" ino=17712 res=1 [ 1473.078236][T14574] tipc: TX() has been purged, node left! [ 1473.192842][ T27] audit: type=1804 audit(1577626477.441:215): pid=25146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1902/bus" dev="sda1" ino=17712 res=1 [ 1473.258211][T14574] tipc: TX() has been purged, node left! [ 1473.448244][T14574] tipc: TX() has been purged, node left! 13:34:37 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10000800}, 0x0) listxattr(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0xceda5000) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[], 0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r3, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x80, 0x6}, 0xfffe, 0xfd}, 0xe) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe5, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) r6 = open(0x0, 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x6) dup2(r6, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000300)=0x6) r7 = open(0x0, 0x800000141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000680)={{{@in=@initdev, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0x305) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, &(0x7f0000000300)=ANY=[], 0x6) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000000300)=0x6) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) 13:34:37 executing program 2: r0 = semget(0x0, 0x1, 0x400) semop(r0, &(0x7f0000000100)=[{0x1, 0x6, 0xc00}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0xffffffffffffffff, 0x2, &(0x7f0000000000)=0x4d6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x14080, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000000c0)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, 0x0, 0x0}, 0x18) 13:34:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x202000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:37 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000500"}) [ 1473.591763][T25102] IPVS: ftp: loaded support on port[0] = 21 [ 1473.742435][T25170] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1473.768060][T25170] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1473.780041][T25170] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) 13:34:38 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "00000000000600"}) 13:34:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6c000000}, 0x2a0}) 13:34:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x720000, 0x0) renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{}, {}, {}, {}]}) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'user.', '{ppp0\x00'}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x0, 0xaaa, 0x1, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet6_buf(r8, 0x29, 0x45, &(0x7f00000001c0)=""/88, &(0x7f0000000100)=0x58) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r6, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r6, 0x0, 0x0}, 0x18) [ 1474.128720][T25188] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1474.136611][T25188] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1474.158883][T25188] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1474.164541][ T27] kauditd_printk_skb: 6 callbacks suppressed 13:34:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) [ 1474.164568][ T27] audit: type=1804 audit(1577626478.491:222): pid=25175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1903/bus" dev="sda1" ino=17722 res=1 13:34:38 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\a\x00'}) [ 1474.284659][ T27] audit: type=1804 audit(1577626478.561:223): pid=25175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1903/bus" dev="sda1" ino=17722 res=1 [ 1474.305671][T25193] IPVS: ftp: loaded support on port[0] = 21 [ 1474.451685][ T27] audit: type=1804 audit(1577626478.771:224): pid=25175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir020487522/syzkaller.oKLTTy/1903/bus" dev="sda1" ino=17722 res=1 13:34:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x68000000}, 0x2a0}) 13:34:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:39 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\b\x00'}) 13:34:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x300000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, 0x0}, 0x20) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000640)={{0x6c, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x3, 'sed\x00', 0x21, 0x80000000, 0x42}, {@remote, 0x2, 0x2, 0x200, 0x4, 0xfffffff9}}, 0x44) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x210000, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r4, 0x80184132, &(0x7f00000000c0)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, 0x0, 0x0}, 0x18) 13:34:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x9, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1474.928747][T25227] IPVS: ftp: loaded support on port[0] = 21 [ 1474.994888][T25225] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) [ 1475.017458][T25225] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1475.160930][T25225] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1475.547825][T25193] IPVS: ftp: loaded support on port[0] = 21 13:34:40 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x74000000}, 0x2a0}) 13:34:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000fffffdfd00"}) 13:34:40 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x400000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:40 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6c000000}, 0x2a0}) [ 1476.391528][T25274] IPVS: ftp: loaded support on port[0] = 21 [ 1476.419838][T25272] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1476.428744][T25272] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:34:40 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) [ 1476.482311][T25272] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:40 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000ff00"}) [ 1476.684055][T25282] IPVS: ftp: loaded support on port[0] = 21 13:34:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000fdfdffff00"}) 13:34:41 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x500000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:41 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:41 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000100"}) [ 1477.364850][T25298] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1477.402058][T25298] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1477.444873][T25274] IPVS: ftp: loaded support on port[0] = 21 [ 1477.518369][T25298] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1478.438215][T14574] tipc: TX() has been purged, node left! [ 1478.638931][T14574] tipc: TX() has been purged, node left! 13:34:43 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x7a000000}, 0x2a0}) 13:34:43 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) 13:34:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000200"}) 13:34:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x600000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 13:34:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, 0x0}, 0x20) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000640)={{0x6c, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x3, 'sed\x00', 0x21, 0x80000000, 0x42}, {@remote, 0x2, 0x2, 0x200, 0x4, 0xfffffff9}}, 0x44) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x210000, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r4, 0x80184132, &(0x7f00000000c0)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, 0x0, 0x0}, 0x18) [ 1478.778202][T14574] tipc: TX() has been purged, node left! 13:34:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000300"}) [ 1478.978188][T14574] tipc: TX() has been purged, node left! [ 1478.984436][T25339] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1479.008598][T25339] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1479.022492][T25345] IPVS: ftp: loaded support on port[0] = 21 13:34:43 executing program 5: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x403, 0x16, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @rand_addr=0xfffffffc}, 0x5}}, @sadb_address={0x5, 0x17, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x6, @rand_addr="eb82c03b9e707e6c13dd2fbc960afd74"}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xaa, 0xfffffffc}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bb0, 0x94, {0x6, 0xff, 0x88, 0x7, 0x0, 0x5, 0x0, @in=@multicast1, @in=@broadcast}}]}, 0xb0}}, 0x0) [ 1479.029951][T25339] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x8553e062868c498, @perf_bp={0x0}, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 1479.118310][T14574] tipc: TX() has been purged, node left! [ 1479.349301][T25351] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000400"}) [ 1479.374719][T25351] loop3: p2 size 1073741824 extends beyond EOD, truncated 13:34:43 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000500"}) [ 1479.472353][T25351] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 13:34:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x700000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1480.020915][T25376] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1480.049297][T25376] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1480.093369][T25376] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 1480.205428][T25345] IPVS: ftp: loaded support on port[0] = 21 [ 1480.293354][T25384] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 1480.332502][T25384] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1480.383445][T25384] loop3: p5 size 1073741824 extends beyond EOD, truncated 13:34:45 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0xfdfdffff}, 0x2a0}) 13:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x242, 0x0) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00', 0x0, 0x20}, 0x10) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000440)={0x5, 0xb, 0x4, 0xe000, 0xd7a, {}, {0x3, 0x0, 0x0, 0x0, 0xcd, 0xfd, "41bc9444"}, 0x6, 0x7f2cb7198ac5137a, @offset=0x9, 0xff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x3ba6af686c946228, 0x0) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000180)=0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r7, 0x40187542, &(0x7f00000001c0)={r2, 0x0, 0x100000000, 0x2000}) syz_mount_image$vfat(&(0x7f0000000540)='\x00\x15\x00\x00S', &(0x7f0000000b00)='./file0\x00', 0x8, 0x0, &(0x7f0000000a00), 0x4400040, 0x0) fchdir(0xffffffffffffffff) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000300)=""/211, 0xf}) socket$pppoe(0x18, 0x1, 0x0) write$P9_RRENAME(r10, &(0x7f0000000100)={0xfffffffffffffd47, 0x15, 0x2}, 0x7) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r12, 0x0, r11) r13 = dup2(r11, 0xffffffffffffffff) r14 = openat$cgroup_ro(r13, &(0x7f0000000500)='cgroup.controllers\x00', 0x275a, 0x0) r15 = getuid() lsetxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x6, 0xd0}, {0x200, 0x8fa2}], r15}, 0x4, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r14, 0xc0185879, 0x0) 13:34:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, "0000000000000000000600"}) 13:34:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 13:34:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) pipe(&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x800000000000000, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1481.149076][T25402] loop3: p1 < > p2 p3 < p5 p6 > p4 13:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x242, 0x0) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000280)='./file0\x00', 0x0, 0x20}, 0x10) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000440)={0x5, 0xb, 0x4, 0xe000, 0xd7a, {}, {0x3, 0x0, 0x0, 0x0, 0xcd, 0xfd, "41bc9444"}, 0x6, 0x7f2cb7198ac5137a, @offset=0x9, 0xff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x3ba6af686c946228, 0x0) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000180)=0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r7, 0x40187542, &(0x7f00000001c0)={r2, 0x0, 0x100000000, 0x2000}) syz_mount_image$vfat(&(0x7f0000000540)='\x00\x15\x00\x00S', &(0x7f0000000b00)='./file0\x00', 0x8, 0x0, &(0x7f0000000a00), 0x4400040, 0x0) fchdir(0xffffffffffffffff) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = socket$inet6_udp(0xa, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$sock_SIOCGIFBR(r10, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000300)=""/211, 0xf}) socket$pppoe(0x18, 0x1, 0x0) write$P9_RRENAME(r10, &(0x7f0000000100)={0xfffffffffffffd47, 0x15, 0x2}, 0x7) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(r12, 0x0, r11) r13 = dup2(r11, 0xffffffffffffffff) r14 = openat$cgroup_ro(r13, &(0x7f0000000500)='cgroup.controllers\x00', 0x275a, 0x0) r15 = getuid() lsetxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x6, 0xd0}, {0x200, 0x8fa2}], r15}, 0x4, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r14, 0xc0185879, 0x0) [ 1481.182016][T25408] IPVS: ftp: loaded support on port[0] = 21 [ 1481.188232][T25402] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 1481.220111][T13280] ================================================================== [ 1481.228266][T13280] BUG: KCSAN: data-race in __d_lookup_done / __dentry_kill [ 1481.236845][T13280] [ 1481.239195][T13280] read to 0xffff8881254f3d80 of 4 bytes by task 13268 on cpu 1: [ 1481.246946][T13280] __dentry_kill+0x1be/0x3c0 [ 1481.251535][T13280] dput+0x3b5/0x750 [ 1481.255354][T13280] follow_managed+0x1eb/0x6f0 [ 1481.260047][T13280] walk_component+0x4ec/0xd90 [ 1481.265520][T13280] link_path_walk.part.0+0x5d3/0xa90 [ 1481.271022][T13280] path_lookupat.isra.0+0x77/0x5a0 [ 1481.276142][T13280] filename_lookup+0x145/0x2b0 [ 1481.280919][T13280] user_path_at_empty+0x4c/0x70 [ 1481.285779][T13280] vfs_statx+0xd9/0x190 [ 1481.289945][T13280] __do_sys_newstat+0x51/0xb0 [ 1481.294630][T13280] __x64_sys_newstat+0x3a/0x50 [ 1481.299405][T13280] do_syscall_64+0xcc/0x3a0 [ 1481.303926][T13280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.309963][T13280] [ 1481.312304][T13280] write to 0xffff8881254f3d80 of 4 bytes by task 13280 on cpu 0: [ 1481.320053][T13280] __d_lookup_done+0xb0/0x2f0 [ 1481.324778][T13280] __lookup_slow+0x254/0x2a0 [ 1481.329379][T13280] lookup_slow+0x4f/0x70 [ 1481.333629][T13280] walk_component+0x490/0xd90 [ 1481.338312][T13280] path_lookupat.isra.0+0x13a/0x5a0 [ 1481.343522][T13280] filename_lookup+0x145/0x2b0 [ 1481.348293][T13280] user_path_at_empty+0x4c/0x70 [ 1481.353154][T13280] do_readlinkat+0x84/0x220 [ 1481.357666][T13280] __x64_sys_readlink+0x51/0x70 [ 1481.362637][T13280] do_syscall_64+0xcc/0x3a0 [ 1481.367158][T13280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.373042][T13280] [ 1481.375366][T13280] Reported by Kernel Concurrency Sanitizer on: [ 1481.381617][T13280] CPU: 0 PID: 13280 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 1481.389503][T13280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1481.399559][T13280] ================================================================== [ 1481.407622][T13280] Kernel panic - not syncing: panic_on_warn set ... [ 1481.414214][T13280] CPU: 0 PID: 13280 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 1481.423006][T13280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1481.433214][T13280] Call Trace: [ 1481.436518][T13280] dump_stack+0x11d/0x181 [ 1481.440872][T13280] panic+0x210/0x640 [ 1481.444787][T13280] ? vprintk_func+0x8d/0x140 [ 1481.449397][T13280] kcsan_report.cold+0xc/0xd [ 1481.454006][T13280] kcsan_setup_watchpoint+0x3fe/0x460 [ 1481.459401][T13280] __tsan_unaligned_write4+0xc7/0x110 [ 1481.464799][T13280] __d_lookup_done+0xb0/0x2f0 [ 1481.469496][T13280] ? kernfs_iop_lookup+0x158/0x190 [ 1481.474614][T13280] __lookup_slow+0x254/0x2a0 [ 1481.479218][T13280] lookup_slow+0x4f/0x70 [ 1481.483468][T13280] walk_component+0x490/0xd90 [ 1481.488340][T13280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1481.495000][T13280] ? link_path_walk.part.0+0x77f/0xa90 [ 1481.500498][T13280] path_lookupat.isra.0+0x13a/0x5a0 [ 1481.505743][T13280] ? __read_once_size.constprop.0+0x12/0x20 [ 1481.511658][T13280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1481.517946][T13280] filename_lookup+0x145/0x2b0 [ 1481.522738][T13280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1481.528994][T13280] ? strncpy_from_user+0x219/0x2b0 [ 1481.534123][T13280] ? getname_flags+0x1a4/0x380 [ 1481.538944][T13280] user_path_at_empty+0x4c/0x70 [ 1481.543822][T13280] do_readlinkat+0x84/0x220 [ 1481.548357][T13280] __x64_sys_readlink+0x51/0x70 [ 1481.553223][T13280] do_syscall_64+0xcc/0x3a0 [ 1481.557746][T13280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.563641][T13280] RIP: 0033:0x7f744b2f9577 13:34:45 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x80489439, &(0x7f0000000040)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 1481.568068][T13280] Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 [ 1481.587689][T13280] RSP: 002b:00007ffe3a0f8968 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 1481.596549][T13280] RAX: ffffffffffffffda RBX: 000000000222e250 RCX: 00007f744b2f9577 [ 1481.604530][T13280] RDX: 0000000000000400 RSI: 00007ffe3a0f8970 RDI: 00007ffe3a0f8e50 [ 1481.612518][T13280] RBP: 000000000222e720 R08: 7665642f7379732f R09: 7269762f73656369 [ 1481.620499][T13280] R10: 6f6c622f6c617574 R11: 0000000000000246 R12: 00007ffe3a0f8e50 [ 1481.628497][T13280] R13: 0000000000000400 R14: 000000000222e250 R15: 000000000000000b [ 1481.637935][T13280] Kernel Offset: disabled [ 1481.642263][T13280] Rebooting in 86400 seconds..