[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.186' (ECDSA) to the list of known hosts. 2020/12/08 19:51:25 fuzzer started 2020/12/08 19:51:25 dialing manager at 10.128.0.26:35269 2020/12/08 19:51:25 syscalls: 3352 2020/12/08 19:51:25 code coverage: enabled 2020/12/08 19:51:25 comparison tracing: enabled 2020/12/08 19:51:25 extra coverage: enabled 2020/12/08 19:51:25 setuid sandbox: enabled 2020/12/08 19:51:25 namespace sandbox: enabled 2020/12/08 19:51:25 Android sandbox: /sys/fs/selinux/policy does not exist 2020/12/08 19:51:25 fault injection: enabled 2020/12/08 19:51:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/08 19:51:25 net packet injection: enabled 2020/12/08 19:51:25 net device setup: enabled 2020/12/08 19:51:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/08 19:51:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/08 19:51:25 USB emulation: enabled 2020/12/08 19:51:25 hci packet injection: enabled 2020/12/08 19:51:25 wifi device emulation: enabled 19:55:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='syscall\x00') read$FUSE(r0, 0x0, 0x0) 19:55:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 19:55:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000008a80)='net/vlan/config\x00') r1 = syz_open_procfs(0x0, &(0x7f0000008a80)='net/vlan/config\x00') sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x10, 0x1, 0x1, [r1]}}], 0x10}, 0x20088051) 19:55:10 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xadc, 0x88040, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffff, 0x7}, 0x1fb01, 0x4000, 0x2, 0x5, 0x0, 0x0, 0x81}, 0x0, 0xd, 0xffffffffffffffff, 0x5) r1 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x6041, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sysfs$1(0x1, &(0x7f0000000080)=']!\x1b\x00') ioctl$LOOP_SET_STATUS(r2, 0x4c02, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x10000) r4 = memfd_create(&(0x7f00000003c0)='C\x0f\xcb\x8d\x1a6\x03\xb4\x9e\xb4\xd2\x8f\xb5\xfeEG`tE\xfcA\xcc\x7fCTq\xbb\x88\xa2s\xd4\xb6\xe5\xc2+\xce\x7f\xaf\x8f\xeb\xdd\xe1\xeb:\xacn\xf49*q\xb6Ef}\x86\x80\xd7\x83s\xd1\x97Pp\xec\x1fa\xcb\x87\xb0\xdd\x1b\xcbJ\xc9Rg\x8c\x7fvg\x91\xe6 \xb8', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = fcntl$dupfd(r3, 0x406, r2) ioctl$KDMKTONE(r5, 0x4b30, 0xfec3) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0x5fcab16599223d52, 0x0, 0x7}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc032b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x129, 0x8}, 0x38b705454f7c8553, 0x0, 0x1, 0x2, 0x80000, 0x8}, 0x0, 0xc, r1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = perf_event_open(&(0x7f0000c86f88)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x40904, 0xffffffffffffffff, 0x8, 0x1, 0x0, 0x1c}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r7 = gettid() tkill(r7, 0x3c) r8 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x2) dup3(r8, r6, 0x0) 19:55:10 executing program 4: r0 = gettid() sched_rr_get_interval(0x0, &(0x7f0000000000)) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 19:55:10 executing program 5: mbind(&(0x7f0000ff5000/0x8000)=nil, 0x8000, 0x0, 0x0, 0x0, 0xa) syzkaller login: [ 332.367914][ T8495] IPVS: ftp: loaded support on port[0] = 21 [ 332.524458][ T8495] chnl_net:caif_netlink_parms(): no params data found [ 332.565309][ T8497] IPVS: ftp: loaded support on port[0] = 21 [ 332.634397][ T8499] IPVS: ftp: loaded support on port[0] = 21 [ 332.723775][ T8495] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.732908][ T8495] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.741645][ T8495] device bridge_slave_0 entered promiscuous mode [ 332.751569][ T8495] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.768190][ T8495] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.775931][ T8495] device bridge_slave_1 entered promiscuous mode [ 332.806329][ T8501] IPVS: ftp: loaded support on port[0] = 21 [ 332.933017][ T8503] IPVS: ftp: loaded support on port[0] = 21 [ 332.943662][ T8495] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.047851][ T8495] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.061877][ T8497] chnl_net:caif_netlink_parms(): no params data found [ 333.065010][ T8505] IPVS: ftp: loaded support on port[0] = 21 [ 333.147331][ T8495] team0: Port device team_slave_0 added [ 333.156448][ T8499] chnl_net:caif_netlink_parms(): no params data found [ 333.186713][ T8495] team0: Port device team_slave_1 added [ 333.225386][ T8495] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 333.232939][ T8495] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.260241][ T8495] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 333.274698][ T8495] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 333.282988][ T8495] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.309414][ T8495] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 333.392265][ T8497] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.400025][ T8497] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.410385][ T8497] device bridge_slave_0 entered promiscuous mode [ 333.422883][ T8497] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.430363][ T8497] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.438428][ T8497] device bridge_slave_1 entered promiscuous mode [ 333.462434][ T8501] chnl_net:caif_netlink_parms(): no params data found [ 333.487608][ T8495] device hsr_slave_0 entered promiscuous mode [ 333.495754][ T8495] device hsr_slave_1 entered promiscuous mode [ 333.527378][ T8499] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.534823][ T8499] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.545462][ T8499] device bridge_slave_0 entered promiscuous mode [ 333.573374][ T8499] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.584296][ T8499] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.593334][ T8499] device bridge_slave_1 entered promiscuous mode [ 333.624668][ T8497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.636875][ T8497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.726333][ T8499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.765429][ T8497] team0: Port device team_slave_0 added [ 333.774538][ T8499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.784278][ T8505] chnl_net:caif_netlink_parms(): no params data found [ 333.803371][ T8497] team0: Port device team_slave_1 added [ 333.824571][ T8499] team0: Port device team_slave_0 added [ 333.832029][ T8503] chnl_net:caif_netlink_parms(): no params data found [ 333.858871][ T8499] team0: Port device team_slave_1 added [ 333.872574][ T8501] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.880110][ T8501] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.888185][ T8501] device bridge_slave_0 entered promiscuous mode [ 333.921515][ T8501] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.929973][ T8501] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.937448][ T8501] device bridge_slave_1 entered promiscuous mode [ 333.948652][ T8497] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 333.955784][ T8497] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.983317][ T8497] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.005957][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 334.013335][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.040913][ T8499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.070209][ T8497] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.077345][ T8497] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.105235][ T8497] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.120224][ T8499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.127444][ T8499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.153797][ T8499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.173046][ T8501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.212772][ T8497] device hsr_slave_0 entered promiscuous mode [ 334.220529][ T8497] device hsr_slave_1 entered promiscuous mode [ 334.228903][ T8497] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 334.236603][ T8497] Cannot create hsr debugfs directory [ 334.251797][ T8501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.285491][ T8503] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.292988][ T8503] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.301809][ T8503] device bridge_slave_0 entered promiscuous mode [ 334.311916][ T8503] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.319797][ T8503] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.327538][ T8503] device bridge_slave_1 entered promiscuous mode [ 334.354899][ T8501] team0: Port device team_slave_0 added [ 334.373531][ T8499] device hsr_slave_0 entered promiscuous mode [ 334.380442][ T8499] device hsr_slave_1 entered promiscuous mode [ 334.386916][ T8499] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 334.395296][ T8499] Cannot create hsr debugfs directory [ 334.406110][ T8505] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.413497][ T8505] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.421546][ T8166] Bluetooth: hci0: command 0x0409 tx timeout [ 334.422132][ T8505] device bridge_slave_0 entered promiscuous mode [ 334.436617][ T8501] team0: Port device team_slave_1 added [ 334.474401][ T8503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.485549][ T8505] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.492814][ T8505] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.500830][ T8505] device bridge_slave_1 entered promiscuous mode [ 334.509648][ T8501] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 334.516635][ T8501] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.542751][ T8501] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.556573][ T8501] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.563908][ T8501] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.592159][ T8501] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.602860][ T33] Bluetooth: hci1: command 0x0409 tx timeout [ 334.612850][ T8503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.663371][ T8166] Bluetooth: hci2: command 0x0409 tx timeout [ 334.700008][ T8505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.715957][ T8501] device hsr_slave_0 entered promiscuous mode [ 334.725182][ T8501] device hsr_slave_1 entered promiscuous mode [ 334.732493][ T8501] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 334.740794][ T8501] Cannot create hsr debugfs directory [ 334.752200][ T8505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.766188][ T8503] team0: Port device team_slave_0 added [ 334.784484][ T8495] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 334.804791][ T8503] team0: Port device team_slave_1 added [ 334.818619][ T3189] Bluetooth: hci3: command 0x0409 tx timeout [ 334.848465][ T8495] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 334.870077][ T8505] team0: Port device team_slave_0 added [ 334.891339][ T8505] team0: Port device team_slave_1 added [ 334.898381][ T8578] Bluetooth: hci4: command 0x0409 tx timeout [ 334.911153][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 334.918676][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.944967][ T8503] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.957542][ T8495] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 334.977755][ T3189] Bluetooth: hci5: command 0x0409 tx timeout [ 334.980222][ T8497] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 334.994637][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 335.003288][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.029808][ T8503] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 335.052325][ T8495] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 335.079747][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 335.086904][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.114535][ T8505] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 335.129467][ T8497] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 335.144035][ T8503] device hsr_slave_0 entered promiscuous mode [ 335.151091][ T8503] device hsr_slave_1 entered promiscuous mode [ 335.158771][ T8503] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 335.167186][ T8503] Cannot create hsr debugfs directory [ 335.198770][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 335.205747][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.232606][ T8505] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 335.243954][ T8497] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 335.259742][ T8497] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 335.313285][ T8505] device hsr_slave_0 entered promiscuous mode [ 335.320720][ T8505] device hsr_slave_1 entered promiscuous mode [ 335.329406][ T8505] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 335.337252][ T8505] Cannot create hsr debugfs directory [ 335.418423][ T8499] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 335.430860][ T8499] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 335.448455][ T8499] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 335.492532][ T8499] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 335.533587][ T8501] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 335.555518][ T8501] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 335.573333][ T8501] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 335.614590][ T8501] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 335.653173][ T8503] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 335.662242][ T8503] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 335.678651][ T8503] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 335.709584][ T8495] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.726976][ T8503] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 335.765640][ T8495] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.800441][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.808843][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.849363][ T8505] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 335.865361][ T8505] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 335.875701][ T8505] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 335.890515][ T8499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.919565][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.930318][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.940582][ T8578] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.948151][ T8578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.956436][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.966298][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.974716][ T8578] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.981803][ T8578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.990175][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.998441][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.006002][ T8505] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 336.021313][ T8497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.031573][ T8499] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.049952][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.060704][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.082569][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.093053][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 336.105657][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.120967][ T8501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.134403][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.142721][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.151739][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.162763][ T8578] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.170125][ T8578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.179060][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.187457][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.196305][ T8578] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.203385][ T8578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.212806][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.235054][ T8495] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 336.245977][ T8495] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 336.262503][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.278960][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.287461][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.296115][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.304912][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.313490][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.321745][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.332816][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 336.368484][ T8497] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.376082][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.384784][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.395427][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.404378][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 336.413461][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.422124][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.431148][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.439884][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.451638][ T8501] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.468066][ T8503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.476564][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.491341][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.508445][ T8578] Bluetooth: hci0: command 0x041b tx timeout [ 336.517008][ T8495] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 336.530875][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.539834][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.549235][ T3189] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.556660][ T3189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.565210][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 336.572800][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 336.580643][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.589431][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.597634][ T3189] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.604811][ T3189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.612489][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.621116][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.659174][ T9796] Bluetooth: hci1: command 0x041b tx timeout [ 336.666252][ T8503] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.673599][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.684970][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.693893][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.702712][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.711779][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.720658][ T8578] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.727960][ T8578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.735527][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 336.744745][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.753148][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 336.761885][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.770543][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.780391][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.788865][ T8578] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.795990][ T8578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.803620][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.811782][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.819534][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 336.828967][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.836737][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.845215][ T8578] Bluetooth: hci2: command 0x041b tx timeout [ 336.867574][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 336.876777][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.886010][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 336.894874][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.904616][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.913527][ T3189] Bluetooth: hci3: command 0x041b tx timeout [ 336.946716][ T8505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.959659][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.968411][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.976594][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.983680][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.991667][ T8578] Bluetooth: hci4: command 0x041b tx timeout [ 336.993169][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.006398][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.014786][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.023569][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.032889][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.040095][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.048388][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.056884][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.065631][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.067944][ T8578] Bluetooth: hci5: command 0x041b tx timeout [ 337.073145][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.087037][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.095133][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.113731][ T8499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.136091][ T8505] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.148929][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.158277][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.166379][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.175013][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.183798][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.192494][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.200725][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.208599][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.216831][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.250100][ T8495] device veth0_vlan entered promiscuous mode [ 337.268924][ T8501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.278870][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.287230][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.297287][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.308227][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.316638][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.325563][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.334239][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.342999][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.351693][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.360653][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.369275][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.377291][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.386688][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.395232][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.404314][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.413467][ T8578] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.420614][ T8578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.429753][ T8497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.446532][ T8503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.458119][ T8503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.479228][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.487185][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.496090][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.505769][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.515972][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.525343][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.534087][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.542880][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.551649][ T8578] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.558943][ T8578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.566665][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.576183][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.589981][ T8495] device veth1_vlan entered promiscuous mode [ 337.633222][ T8501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.642325][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 337.651980][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 337.661172][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.670663][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.679368][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.687001][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.716139][ T8495] device veth0_macvtap entered promiscuous mode [ 337.734574][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.745336][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.754492][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.763235][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.772165][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.781907][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.791054][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.800012][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.807517][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.816443][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.826369][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.835841][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.844873][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.852876][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.861360][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.869608][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 337.899333][ T8495] device veth1_macvtap entered promiscuous mode [ 337.906968][ T8499] device veth0_vlan entered promiscuous mode [ 337.916050][ T8503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.935127][ T8497] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.960005][ T8499] device veth1_vlan entered promiscuous mode [ 337.970783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.980516][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.996321][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.005963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.032101][ T8495] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 338.052715][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.078453][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.087234][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.101046][ T8495] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 338.128742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 338.137654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.154878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.166839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.177253][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.185971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.204651][ T8495] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 338.216640][ T8495] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 338.226168][ T8495] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 338.235624][ T8495] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 338.258722][ T8501] device veth0_vlan entered promiscuous mode [ 338.266162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.276001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.284682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.292951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.305259][ T8497] device veth0_vlan entered promiscuous mode [ 338.335180][ T8505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.343746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.359772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.369861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.378756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.400676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.408675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.416255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.426142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.436792][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.448431][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.478336][ T8503] device veth0_vlan entered promiscuous mode [ 338.490446][ T8501] device veth1_vlan entered promiscuous mode [ 338.502007][ T8497] device veth1_vlan entered promiscuous mode [ 338.512901][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.524675][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.534307][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.543496][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.554491][ T8499] device veth0_macvtap entered promiscuous mode [ 338.566080][ T8499] device veth1_macvtap entered promiscuous mode [ 338.579036][ T8578] Bluetooth: hci0: command 0x040f tx timeout [ 338.603580][ T8503] device veth1_vlan entered promiscuous mode [ 338.662020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.674996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.685784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.695333][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 338.705085][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.718583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.727440][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.768966][ T8501] device veth0_macvtap entered promiscuous mode [ 338.780565][ T8931] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 338.784186][ T5] Bluetooth: hci1: command 0x040f tx timeout [ 338.794369][ T8497] device veth0_macvtap entered promiscuous mode [ 338.815121][ T8931] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 338.830420][ T8499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.843535][ T8499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.854872][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 338.871319][ T8501] device veth1_macvtap entered promiscuous mode [ 338.884994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.894441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.910892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.922636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.972126][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.981084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.989463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 338.997156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.006022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.018445][ T5] Bluetooth: hci2: command 0x040f tx timeout [ 339.024834][ T8503] device veth0_macvtap entered promiscuous mode [ 339.030035][ T3189] Bluetooth: hci3: command 0x040f tx timeout [ 339.046650][ T8499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.058236][ T8499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.064045][ T8578] Bluetooth: hci4: command 0x040f tx timeout [ 339.072491][ T8499] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.084223][ T8497] device veth1_macvtap entered promiscuous mode [ 339.092812][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 339.101567][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 339.110132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.119006][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.127498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.136424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.145596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.154326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.163622][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.171768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.179970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 339.188797][ T8503] device veth1_macvtap entered promiscuous mode [ 339.200930][ T8499] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.211026][ T5] Bluetooth: hci5: command 0x040f tx timeout [ 339.215999][ T8499] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.230460][ T8499] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.240077][ T8499] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.252773][ T8505] device veth0_vlan entered promiscuous mode [ 339.264005][ T330] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 339.275202][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.286296][ T330] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 339.291176][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.304897][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.317549][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.331430][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 339.363826][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.375971][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.387408][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.398429][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.408594][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.420115][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.431807][ T8497] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 339.443649][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.452280][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 339.461460][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.470487][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.479539][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.488357][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.500952][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.511964][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.522023][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.533599][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.546934][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.556924][ T8505] device veth1_vlan entered promiscuous mode [ 339.578221][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.589480][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.602196][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.617415][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 19:55:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r0, 0x84, 0x14, 0x0, 0x0) [ 339.629200][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.642222][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.664930][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.677923][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.690344][ T8501] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 339.709563][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 19:55:18 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 339.735274][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.746249][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.760966][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.774718][ T8497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.805447][ T8497] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.819567][ T8497] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.833676][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 339.844639][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 339.853915][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.869270][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.878794][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.887494][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.897310][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 19:55:18 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 339.906438][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.949611][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.978854][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.999041][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.011980][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.031141][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.048417][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.058576][ T8501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.069202][ T8501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.080514][ T8501] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 340.090373][ T8497] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.103476][ T8497] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.112896][ T8497] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.122041][ T8497] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.134996][ T8503] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 19:55:19 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 340.145498][ T8503] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.154803][ T8503] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.167582][ T8503] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.187887][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.198558][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.232715][ T8505] device veth0_macvtap entered promiscuous mode [ 340.266791][ T8501] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.276346][ T8501] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.285589][ T8501] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.298133][ T8501] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.328195][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.337127][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.349866][ T8166] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 19:55:19 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 340.387510][ T8505] device veth1_macvtap entered promiscuous mode [ 340.395399][ T330] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.417317][ T330] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.462293][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.470504][ T108] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.480430][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 340.501297][ T108] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.539662][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 19:55:19 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 340.594029][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.646342][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.658744][ T9797] Bluetooth: hci0: command 0x0419 tx timeout [ 340.666439][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 19:55:19 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 340.704565][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.730319][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.742308][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.752778][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.778335][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.812518][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.827919][ T9797] Bluetooth: hci1: command 0x0419 tx timeout [ 340.830061][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.846380][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 340.860225][ T8931] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.862467][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.883299][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.887994][ T8931] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.919435][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.932777][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.944834][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.956699][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.966989][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.988928][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.000627][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.011552][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.022531][ T8505] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 341.033197][ T8505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 341.051853][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 341.060695][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 341.067418][ T5] Bluetooth: hci2: command 0x0419 tx timeout [ 341.075386][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 341.085076][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.094285][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.112675][ T8505] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.131184][ T8505] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.145179][ T8578] Bluetooth: hci4: command 0x0419 tx timeout [ 341.146031][ T8505] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.162192][ T8505] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.175461][ T330] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.201980][ T8931] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.204898][ T330] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.224816][ T5] Bluetooth: hci5: command 0x0419 tx timeout [ 341.247087][ T8931] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.264729][ T9832] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.298895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 341.306880][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 341.318707][ T330] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.325027][ T9832] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.350767][ T330] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.360062][ T9242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.384039][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 341.391510][ T9242] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.409194][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 341.417146][ T8578] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 341.470341][ T330] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.502828][ T9242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 341.516916][ T9242] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.528818][ T330] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 341.539643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 341.575926][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 19:55:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x2, &(0x7f00000004c0)="f7f2"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:55:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x45, &(0x7f00000004c0)="f7f249b9740c8684445ae826b76af2b60a00088024c30e478947d190ac0000000000000000000000000000000066224897ba4ecb40aa070032a3b88aaf3c06f4970e85a63c"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:55:20 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:20 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x4, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) sendfile(r0, r0, &(0x7f0000000100)=0x9, 0x8080ffffff80) 19:55:20 executing program 4: syz_emit_ethernet(0x9e, &(0x7f0000000200)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x3, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "40000000000095e38bbfae5f"}]}}}}}}, 0x0) 19:55:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1005}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000003c0)=[{0xe8, 0x0, 0x9, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000000000)={0xcc, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x8}, @raw8={"63912aafb3264df10152649d"}}}}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @quote}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x54) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:55:20 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 19:55:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x4, 0x3}, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x2) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="da455864eeb9167c1ec76189e57e50c68e739ea84e4043521453c701ff8f874b7856a5a7434f6091814e0c7f4f80d24902643c3d4076752752ef6d2b215fa2a85b69f7e26f3abbc9a62fa52d09fd1f96d8ef9bb84710faa5b92bf6c168c6c46c66ee6c8e3fe567dd749027291261984989f79cee47a0d6f29044bbb70ef418a052f1dfe9aab165af7d3b7f7cd5e21cd5b2b3e62b7223290a2aaa95a4045fc2e6247ff36502396ca21c18a60fe6f4699dc563d8b40c84269a24486af086b392ce38e2c573d683282f3a9a345c8dcc7483eda3a26183108d8b16b0c4c651625c833462f9b5ad5e6b276ef0f6b2dadc5e48bc2f736a1e97e4496b770d515271e0c1a32713988e3e6086ca4694973913d27316b6e1d324b155314b217f991a23e3c04cdc00b1e6bf2a912d88", 0xa9f9, 0x7}]) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) [ 341.866642][ T9981] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 341.873585][ T9981] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 341.885548][ T9981] loop3: p2 start 4127655699 is beyond EOD, truncated [ 341.894098][ T9981] loop3: p3 start 4081519727 is beyond EOD, truncated [ 341.901524][ T9981] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 341.913739][ T9981] loop3: p5 start 3564482375 is beyond EOD, truncated [ 341.922203][ T9981] loop3: p6 start 241155593 is beyond EOD, truncated [ 341.942562][ T34] audit: type=1804 audit(1607457320.903:2): pid=10000 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir055015790/syzkaller.KyG17i/2/bus" dev="sda1" ino=15776 res=1 errno=0 19:55:21 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 19:55:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:21 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 342.330308][T10012] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 342.348857][T10012] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 342.397207][T10012] loop3: p2 start 4127655699 is beyond EOD, truncated [ 342.441335][T10012] loop3: p3 start 4081519727 is beyond EOD, truncated [ 342.459806][T10012] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 342.489360][T10012] loop3: p5 start 3564482375 is beyond EOD, truncated [ 342.529696][T10012] loop3: p6 start 241155593 is beyond EOD, truncated [ 342.760367][ T34] audit: type=1804 audit(1607457321.723:3): pid=10023 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir055015790/syzkaller.KyG17i/2/bus" dev="sda1" ino=15776 res=1 errno=0 [ 342.793053][ T34] audit: type=1804 audit(1607457321.723:4): pid=10024 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir055015790/syzkaller.KyG17i/2/bus" dev="sda1" ino=15776 res=1 errno=0 [ 342.830682][ T34] audit: type=1804 audit(1607457321.733:5): pid=10024 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir055015790/syzkaller.KyG17i/2/bus" dev="sda1" ino=15776 res=1 errno=0 19:55:23 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = dup(r0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000140), 0x4) 19:55:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:23 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5e, &(0x7f00000004c0)="f7f249b9740c8684445ae826b76af2b60a00088024c30e478947d190ac0000000000000000000000000000000066224897ba4ecb40aa070032a3b88aaf3c06f4970e85a63c9a4b0d8b9aad5ad22ec9c65a310160ee048d7b27fc9c9b84c9"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:55:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x4, 0x3}, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x2) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 19:55:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x2) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="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", 0xa9f9, 0x7}]) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) [ 344.770550][ T34] audit: type=1804 audit(1607457323.723:6): pid=10047 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir055015790/syzkaller.KyG17i/3/bus" dev="sda1" ino=15779 res=1 errno=0 [ 344.797601][ T34] audit: type=1804 audit(1607457323.753:7): pid=10054 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir469583568/syzkaller.tdCh1q/3/bus" dev="sda1" ino=15791 res=1 errno=0 19:55:23 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000001480)=[{&(0x7f0000000180)="1d35421b9d8e471ac0b110b14fa22d043a72e979d992c421a921c7b915632ee0726e870ee5d51f6187512451a2199852d1decaeb652ffb401e8705e770c898b3461c1bdbec360dfc3b8063dec8672866c441314738cd79106a2667a3e33cdccd557693437e529c877a17761b58a648d9c76407000e6f28295f74a7d4375ed80c4861019039d0657fa63b187f3331f99172c2f07a46528b5c4d46373b4eb07c7b78903a37320fc6a14c1af5514a19fb917e1dc69b99415fd0442ff554378ff1103ff5ad41381fd73edc81c18db6615a355b3b0d78ce78630338ae21ae29e2a23150b1ad18c57b4b85fff9", 0xea, 0x102}]) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:55:23 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, &(0x7f00000001c0)=ANY=[], 0x48, 0xfffffffffffffff9) 19:55:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 344.878140][T10041] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 344.900544][T10041] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 344.934872][T10041] loop3: p2 start 4127655699 is beyond EOD, truncated [ 344.962014][T10041] loop3: p3 start 4081519727 is beyond EOD, truncated [ 344.969568][T10041] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 344.980746][T10041] loop3: p5 start 3564482375 is beyond EOD, truncated [ 345.006060][T10041] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, 0x0, 0x0) [ 345.118497][T10067] Dev loop2: unable to read RDB block 1 [ 345.159810][T10067] loop2: unable to read partition table 19:55:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 19:55:24 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 345.249822][T10067] loop2: partition table beyond EOD, truncated [ 345.251596][ T4896] Dev loop2: unable to read RDB block 1 [ 345.264766][T10067] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 345.322508][ T4896] loop2: unable to read partition table [ 345.363593][ T4896] loop2: partition table beyond EOD, truncated 19:55:24 executing program 0: openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:24 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2201, &(0x7f0000000080)) [ 345.509095][T10067] Dev loop2: unable to read RDB block 1 [ 345.517185][T10067] loop2: unable to read partition table [ 345.528232][T10067] loop2: partition table beyond EOD, truncated [ 345.534807][T10067] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 345.551194][T10083] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 19:55:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) [ 345.579382][T10083] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 345.616208][T10083] loop3: p2 start 4127655699 is beyond EOD, truncated [ 345.664116][ T34] audit: type=1804 audit(1607457324.623:8): pid=10096 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir469583568/syzkaller.tdCh1q/3/bus" dev="sda1" ino=15791 res=1 errno=0 [ 345.672839][T10083] loop3: p3 start 4081519727 is beyond EOD, truncated [ 345.753962][ T34] audit: type=1804 audit(1607457324.713:9): pid=10094 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir469583568/syzkaller.tdCh1q/3/bus" dev="sda1" ino=15791 res=1 errno=0 19:55:24 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000002040)) 19:55:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 19:55:24 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8001) 19:55:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0xc, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 345.757428][T10083] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 345.803564][ T34] audit: type=1804 audit(1607457324.713:10): pid=10102 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir469583568/syzkaller.tdCh1q/3/bus" dev="sda1" ino=15791 res=1 errno=0 [ 345.807474][T10083] loop3: p5 start 3564482375 is beyond EOD, truncated [ 345.835490][T10083] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:24 executing program 0: openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @multicast, @dev={0xac, 0x14, 0x14, 0x2a}, @empty, @local}}}}, 0x0) 19:55:24 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='f', 0x1, r0) 19:55:24 executing program 3: socket$kcm(0x2b, 0x1, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000001240), 0x4) 19:55:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0xa, 0x0, 0x0) 19:55:25 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x10}, 0x10}}, 0x0) 19:55:25 executing program 0: openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890c, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 19:55:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x1274, 0x0) 19:55:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x2, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 346.148024][T10127] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 346.154061][T10127] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0xb, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:25 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0x0) [ 346.214278][T10127] loop3: p2 start 4127655699 is beyond EOD, truncated 19:55:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x4c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x7, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 346.276271][T10127] loop3: p3 start 4081519727 is beyond EOD, truncated [ 346.298803][T10127] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 346.307136][T10127] loop3: p5 start 3564482375 is beyond EOD, truncated [ 346.314993][T10127] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:25 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:25 executing program 2: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f00000020c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 19:55:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 19:55:25 executing program 3: socket$kcm(0x2b, 0x1, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback}}) 19:55:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 19:55:25 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8983, 0x0) 19:55:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}]}, 0x1c}}, 0x0) 19:55:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000780)={@remote, @rand_addr=' \x01\x00', @private0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81800000}) 19:55:25 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 346.623870][T10170] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 346.642865][T10170] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 346.702049][T10170] loop3: p2 start 4127655699 is beyond EOD, truncated [ 346.733651][T10170] loop3: p3 start 4081519727 is beyond EOD, truncated [ 346.746741][T10170] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 346.757346][T10170] loop3: p5 start 3564482375 is beyond EOD, truncated [ 346.765344][T10170] loop3: p6 start 241155593 is beyond EOD, truncated [ 346.777272][ T4896] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 346.784451][ T4896] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 346.793778][ T4896] loop3: p2 start 4127655699 is beyond EOD, truncated [ 346.801559][ T4896] loop3: p3 start 4081519727 is beyond EOD, truncated [ 346.808884][ T4896] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 346.816661][ T4896] loop3: p5 start 3564482375 is beyond EOD, truncated [ 346.833665][ T4896] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, @l2tp={0x2, 0x0, @private}, @vsock={0x28, 0x0, 0x0, @host}, @ipx={0x4, 0x0, 0x0, "3c7d20458af2"}}) 19:55:26 executing program 2: syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8, 0x0) 19:55:26 executing program 5: pipe(&(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_congestion(r0, &(0x7f0000002200)='cdg\x00', 0x4) 19:55:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x1267, &(0x7f0000000080)) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, 0x0) io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 3: socket$kcm(0x2b, 0x1, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:26 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x5608, 0x0) 19:55:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80084504, &(0x7f00000001c0)) 19:55:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5452, &(0x7f0000000500)={'batadv_slave_0\x00'}) [ 347.264248][T10208] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 347.274480][T10208] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 347.284151][T10208] loop3: p2 start 4127655699 is beyond EOD, truncated [ 347.293244][T10208] loop3: p3 start 4081519727 is beyond EOD, truncated [ 347.307271][T10208] loop3: p4 size 2221362797 extends beyond EOD, truncated 19:55:26 executing program 4: io_setup(0x19, &(0x7f0000000040)=0x0) io_submit(r0, 0x3, &(0x7f0000000740)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0, 0x0]) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x0, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 347.333668][T10208] loop3: p5 start 3564482375 is beyond EOD, truncated [ 347.342973][T10208] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:26 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x802, 0x0) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28}, 0x28) 19:55:26 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:26 executing program 1: prctl$PR_GET_DUMPABLE(0x4) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x0, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 2: prctl$PR_GET_DUMPABLE(0x25) 19:55:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0xfffffffffffffffd) 19:55:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10042) 19:55:26 executing program 1: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0xa00) [ 347.568436][T10244] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 347.577630][T10244] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 347.619632][T10244] loop3: p2 start 4127655699 is beyond EOD, truncated [ 347.634710][T10244] loop3: p3 start 4081519727 is beyond EOD, truncated [ 347.643607][T10244] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 347.657489][T10244] loop3: p5 start 3564482375 is beyond EOD, truncated 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x0, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000180)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) mount$9p_rdma(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x0, 0x0) setregid(0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'a', ' *:* ', 'm\x00'}, 0x8) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) [ 347.666158][T10244] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:26 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480), 0x0) 19:55:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:55:26 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x5, 0x40, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x5, 0x40, 0x5}, 0x40) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private0, 0x1}}) [ 347.909196][T10274] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:55:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x4, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:27 executing program 1: r0 = socket(0xa, 0x3, 0x80) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}}, 0x0) [ 348.029295][T10288] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 348.037297][T10288] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000180)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) mount$9p_rdma(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x0, 0x0) setregid(0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'a', ' *:* ', 'm\x00'}, 0x8) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) 19:55:27 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x15a674e89ecb6260) 19:55:27 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 348.086748][T10288] loop3: p2 start 4127655699 is beyond EOD, truncated [ 348.094804][T10288] loop3: p3 start 4081519727 is beyond EOD, truncated [ 348.102220][T10288] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 348.114069][T10288] loop3: p5 start 3564482375 is beyond EOD, truncated [ 348.121839][T10288] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:27 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63fb1a7047af75d48df109167dda7845b8c5a7dd2fa6073dc2771d5ce82588cb09be5f0e9383762a3adfde41dd830117f769c4dbb3a627e4084f31e12195412cee39b1c94b2a4e02a1e1e9fc6901d394f749dd1e62d129b505a0dcc1201f9db7619bb9398762e4bf055f9ad7515a4e5ff3da75fc9f3ce0d137db1750fbc556ebeee2b91df24c1d1b4a0288e23e966887c136bfba331d505f82e0e7f626e0e1090a725d6b13603df8b613eb3dd3682627302673051847aa39cedfc4ad1badb46b39b730aeff5da7d16dd63bbe36031f97a6c4e5468968996d1081e5497c2e092fead88bf454", 0x1c9}]) 19:55:27 executing program 1: keyctl$instantiate(0x10, 0x0, 0x0, 0x0, 0x0) 19:55:27 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 19:55:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8934, &(0x7f0000000100)={'batadv_slave_0\x00'}) 19:55:27 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 19:55:27 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 348.286172][T10319] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:55:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "81"}]}}, &(0x7f00000003c0)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) [ 348.336543][ C0] hrtimer: interrupt took 46460 ns 19:55:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x43, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 348.407959][T10329] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 348.413709][T10329] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000000201250000000000000000f2a5b4"], 0x14}}, 0x0) 19:55:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000180)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) mount$9p_rdma(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x0, 0x0) setregid(0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'a', ' *:* ', 'm\x00'}, 0x8) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) [ 348.478748][T10329] loop3: p2 start 4127655699 is beyond EOD, truncated [ 348.485663][T10329] loop3: p3 start 4081519727 is beyond EOD, truncated [ 348.500795][T10329] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 348.514902][T10329] loop3: p5 start 3564482375 is beyond EOD, truncated 19:55:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x8, 0x0, &(0x7f00000000c0)) 19:55:27 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 348.531440][T10329] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:27 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:27 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f00000011c0)='/dev/vsock\x00', &(0x7f0000001200), 0x0) 19:55:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000000)={'gre0\x00', @ifru_flags}) 19:55:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 348.732592][T10359] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:55:27 executing program 5: keyctl$revoke(0x3, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0193c77c67ac7d6b5c36a3de4a95a620ae92b84474bcdb0d20a0af1cc1e56621db40d780d9a83f40d98fd29937b8e7e864020edd5d85feb32928ba925672b262"}, 0x48, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r0, 0x0) 19:55:27 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, 0x0) [ 348.798306][T10363] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 348.804481][T10363] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x10, 0x0, 0x0) 19:55:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x4020940d, &(0x7f0000000180)={0x0, 0x0, "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", "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"}) [ 348.901927][T10363] loop3: p2 start 4127655699 is beyond EOD, truncated 19:55:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f00000002c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000180)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f00000002c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) mount$9p_rdma(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x0, 0x0) setregid(0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)={'a', ' *:* ', 'm\x00'}, 0x8) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) [ 348.953362][T10363] loop3: p3 start 4081519727 is beyond EOD, truncated 19:55:27 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, 0x0) 19:55:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0xc0481273, 0x0) [ 348.995168][T10363] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 349.032712][T10363] loop3: p5 start 3564482375 is beyond EOD, truncated [ 349.067591][T10363] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:28 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', ')$#@D\x00'}, &(0x7f0000000380)=':^)\xc5@{/\x80\x10./\x00', 0xc, 0x0) 19:55:28 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='sched\x00') 19:55:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000001040)='%\x00', 0x0, r0) [ 349.155640][T10393] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:55:28 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, 0x0) 19:55:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8947, &(0x7f0000000080)={'sit0\x00', 0x0}) 19:55:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', ')$#@D\x00'}, &(0x7f0000000380)=':^)\xc5@{/\x80\x10./\x00', 0xc, 0x0) 19:55:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 19:55:28 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 19:55:28 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, &(0x7f0000000240)) [ 349.423340][T10412] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 349.444346][T10412] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:28 executing program 1: setresuid(0x0, 0xee01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) 19:55:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7, &(0x7f00000002c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 349.493215][T10412] loop3: p2 start 4127655699 is beyond EOD, truncated [ 349.524575][T10412] loop3: p3 start 4081519727 is beyond EOD, truncated [ 349.583379][T10412] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 349.641798][T10412] loop3: p5 start 3564482375 is beyond EOD, truncated [ 349.663138][T10412] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:28 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:28 executing program 2: request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='$@-+\x00', 0xffffffffffffffff) 19:55:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', ')$#@D\x00'}, &(0x7f0000000380)=':^)\xc5@{/\x80\x10./\x00', 0xc, 0x0) 19:55:28 executing program 1: r0 = fsopen(&(0x7f0000000380)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 19:55:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x15}, 0x40) 19:55:28 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, &(0x7f0000000240)) 19:55:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, 0x0, 0x0) 19:55:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x890b, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 19:55:28 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000080)={0x1f}, &(0x7f0000000100)={0x0, r0+60000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x100000001]}, 0x8}) 19:55:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', ')$#@D\x00'}, &(0x7f0000000380)=':^)\xc5@{/\x80\x10./\x00', 0xc, 0x0) 19:55:28 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, &(0x7f0000000240)) [ 349.914707][T10451] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 349.920514][T10451] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 349.928864][T10451] loop3: p2 start 4127655699 is beyond EOD, truncated [ 349.936544][T10451] loop3: p3 start 4081519727 is beyond EOD, truncated [ 349.943782][T10451] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 349.991991][T10451] loop3: p5 start 3564482375 is beyond EOD, truncated 19:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x13, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 350.045886][T10451] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63fb1a7047af75d48df109167dda7845b8c5a7dd2fa6073dc2771d5ce82588cb09be5f0e9383762a3adfde41dd830117f769c4dbb3a627e4084f31e12195412cee39b1c94b2a4e02a1e1e9fc6901d394f749dd1e62d129b505a0dcc1201f9db7619bb9398762e4bf055f9ad7515a4e5ff3da75fc9f3ce0d137db1750fbc556ebeee2b91df24c1d1b4a0288e23e966887c136bfba331d505f82e0e7f626e0e1090a725d6b13603df8b613eb3dd3682627302673051847aa39cedfc4ad1badb46b39b730aeff5da7d16dd63bbe36031f97a6c4e5468968996d1081e5497c2e092fead88bf454", 0x1c9}]) 19:55:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x26, 0x0, &(0x7f00000000c0)) 19:55:29 executing program 4: clone(0x3a3dd4008500af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000380)='4\xacXrcO\b\xc4ut/eve\x94\xa1m\x1e\x12\x8ai,\xbet#\x00\xd6\xbc%\rX\xdf\xc5T\xfc\xaa\x7f\x164\xc3\xd60X\xa4\xe6\xb76I\xd2\xf49\x19\x92\xe0\xb7\x92\x03V\xa2\x17\xd6? n\xd1|\x1b\xc9\xd4<\xca\xabs\rw\xdd\x9f\xfe\xc0\x1cz\xa9\x83\r\x85\x9c8_\x04\xa5\xa8\xff\x80\xc7\xe0^J\xd3\xe2\xb6b}H\xe9c\xff\x15\xb8laJ\xca\x18\xd3s;0!\xa9\xdc\xec!\x1f\xa6\xe4\xd6\xac\xb6\xbf\xe5\x956\xe0\xff\xa6\x81t\x8f\xc8WUA\x05\x11\t\x1d\x82\xc0\xc6\xf8y\x1e\xa2\xf2\x00[N \xcbV\x83\x88\x9a\x129\xcc\xe5uL\x1b\xbfI|9\xd9\xb8\xe1\xf3\x04\xdd\xf9\xa1)\x0f}\x90y2\xd3\x94[\xa3\xc3\x98\xa3\x14\x8c\xe5\x8f$(\xcei\x9a#\\Qr0\x01o\x88\xf1c\xf1.:V\xb4\xdb\x9f\xd8IT\x95R\x82]\xb4Z3G*Na$\xedp\x0f+!\xab\x1f\x13\xee\xd0\x03\x93\x0f\xf8U\x1c\xc7\x0f\x01K\xd7\xb6\xd5\x81\xd7*\xb6\xc0Pu\xa6\x15qZ\x87-\x18\x9aQ\x85\xd0\xd6\xaeE\x93K\x06\xdd\xd5\x10\x8dX\xb4uo\xf5\xbb0\x97{(\tDz)q\xd8\xd3\x01\xcd\x06\xf0(\'Z\x05\xc2\xe9\x17\xa5\x9c\xc8\xa5\xb8`\x95\xdb\xdc\xc4\xdc\xd3J0\x0f\xb5\xf8\x9f\xc4\xe1\xab\xf0\xe1\x94\xeb', 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 19:55:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000002500)=0x1e) 19:55:29 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200082, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='/dev/vsock\x00', &(0x7f0000000080)='./file0\x00', r0) 19:55:29 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[0x0]) 19:55:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000480)={0x38, 0x3, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 19:55:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_pid(r0, 0x0, 0x0) 19:55:29 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/stat\x00', 0x0, 0x0) 19:55:29 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000002540)='.\x00', 0x4000000) [ 350.323411][T10499] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 350.346646][T10494] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 350.353432][T10494] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 350.410529][T10494] loop3: p2 start 4127655699 is beyond EOD, truncated 19:55:29 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[0x0]) 19:55:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xc, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 350.464055][T10494] loop3: p3 start 4081519727 is beyond EOD, truncated [ 350.477783][T10494] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 350.493011][T10494] loop3: p5 start 3564482375 is beyond EOD, truncated [ 350.502727][T10494] loop3: p6 start 241155593 is beyond EOD, truncated [ 350.520473][ T4896] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 350.526323][ T4896] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 350.541522][ T4896] loop3: p2 start 4127655699 is beyond EOD, truncated [ 350.555369][ T4896] loop3: p3 start 4081519727 is beyond EOD, truncated 19:55:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@newlinkprop={0x20, 0x6c, 0x1}, 0x20}}, 0x0) 19:55:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x2a, &(0x7f0000000000)="e82e530208e8b8d074cfe360b658348cfe5b2a1b3d2fcea70f4e987b798b6b11f841cdd6dfc382952b630ec66319fc08a7f5d775b64c11f495b240aa634dd2a7ee98c49ddca4e50a26376c3615df656f1a37e1c84514578dd028f1087cec661fde9bc87302d203e7154013741266812f4f9817eb7470ea7212d0a6e2606f11ac524e03b3f0c09ade", 0x88) 19:55:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000600)={@private1, @mcast1, @private1, 0x0, 0x0, 0x40}) 19:55:29 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffff0104c20000000806"], 0x0) [ 350.572915][ T4896] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 350.581425][ T4896] loop3: p5 start 3564482375 is beyond EOD, truncated [ 350.588996][ T4896] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:29 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 19:55:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:55:29 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0193c77c67ac7d6b5c36a3de4a95a620ae92b84474bcdb0d20a0af1cc1e56621db40d780d9a83f40d98fd29937b8e7e864020edd5d85feb32928ba925672b262"}, 0x48, 0xfffffffffffffffc) keyctl$describe(0x6, r0, 0x0, 0x0) 19:55:29 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[0x0]) 19:55:29 executing program 2: socketpair(0x28, 0x0, 0x4, &(0x7f00000001c0)) 19:55:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x3, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a1, &(0x7f0000000100)={'batadv_slave_0\x00'}) [ 350.789169][T10534] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 350.822559][T10534] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 350.867631][T10534] loop3: p2 start 4127655699 is beyond EOD, truncated [ 350.875215][T10534] loop3: p3 start 4081519727 is beyond EOD, truncated [ 350.886294][T10534] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 350.894498][T10534] loop3: p5 start 3564482375 is beyond EOD, truncated [ 350.902472][T10534] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:29 executing program 3: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63fb1a7047af75d48df109167dda7845b8c5a7dd2fa6073dc2771d5ce82588cb09be5f0e9383762a3adfde41dd830117f769c4dbb3a627e4084f31e12195412cee39b1c94b2a4e02a1e1e9fc6901d394f749dd1e62d129b505a0dcc1201f9db7619bb9398762e4bf055f9ad7515a4e5ff3da75fc9f3ce0d137db1750fbc556ebeee2b91df24c1d1b4a0288e23e966887c136bfba331d505f82e0e7f626e0e1090a725d6b13603df8b613eb3dd3682627302673051847aa39cedfc4ad1badb46b39b730aeff5da7d16dd63bbe36031f97a6c4e5468968996d1081e5497c2e092fead88bf454", 0x1c9}]) 19:55:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r0, 0x84, 0x6d, 0x0, &(0x7f00000000c0)) 19:55:29 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+'}, 0x16, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000002c0)=@v3, 0x18, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', ')$#@\\\x00'}, &(0x7f0000000380)=':^)\xc5@{/\x80\x10./\x00', 0xc, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0)=0x6, 0x4) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, 0x0, 0x10) 19:55:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x5, 0x40, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 19:55:29 executing program 2: io_setup(0x400b, &(0x7f0000000040)) 19:55:29 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 19:55:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000480)={0x18, 0x2, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 19:55:30 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x5) 19:55:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, 0x0, 0x0) 19:55:30 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) 19:55:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) read$FUSE(r0, &(0x7f0000000c40)={0x2020}, 0x2020) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c0000001c0025"], 0x6c}}, 0x0) [ 351.138909][T10573] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 351.148244][T10573] loop3: p1 size 2178421545 extends beyond EOD, truncated 19:55:30 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 351.214437][T10573] loop3: p2 start 4127655699 is beyond EOD, truncated [ 351.256462][T10573] loop3: p3 start 4081519727 is beyond EOD, truncated [ 351.266361][T10593] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.288825][T10593] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.312823][T10573] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 351.418951][T10573] loop3: p5 start 3564482375 is beyond EOD, truncated [ 351.445708][T10573] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="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", 0x1c9}]) 19:55:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1b0000001c0025"], 0x6c}}, 0x0) 19:55:30 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x20000811) 19:55:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) recvfrom$inet6(r0, 0x0, 0x0, 0x2022, 0x0, 0x0) 19:55:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x3, 0x7, 0x5}, 0x14}}, 0x0) 19:55:30 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 19:55:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x36, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[], 0x58}}, 0x0) 19:55:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0}], 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) 19:55:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) 19:55:30 executing program 5: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3564, 0x200000) 19:55:30 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x103001, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@target={'target ', {'PCI:', '0', ':', '10', ':', '8', '.', '1a'}}, 0x15) [ 351.682955][T10612] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 351.691509][T10612] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 351.742855][T10612] loop3: p2 start 4127655699 is beyond EOD, truncated [ 351.756165][T10612] loop3: p3 start 4081519727 is beyond EOD, truncated [ 351.765150][T10612] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 351.774005][T10612] loop3: p5 start 3564482375 is beyond EOD, truncated [ 351.784781][T10612] loop3: p6 start 241155593 is beyond EOD, truncated 19:55:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63fb1a7047af75d48df109167dda7845b8c5a7dd2fa6073dc2771d5ce82588cb09be5f0e9383762a3adfde41dd830117f769c4dbb3a627e4084f31e12195412cee39b1c94b2a4e02a1e1e9fc6901d394f749dd1e62d129b505a0dcc1201f9db7619bb9398762e4bf055f9ad7515a4e5ff3da75fc9f3ce0d137db1750fbc556ebeee2b91df24c1d1b4a0288e23e966887c136bfba331d505f82e0e7f626e0e1090a725d6b13603df8b613eb3dd3682627302673051847aa39cedfc4ad1badb46b39b730aeff5da7d16dd63bbe36031f97a6c4e5468968996d1081e5497c2e092fead88bf454", 0x1c9}]) 19:55:30 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 19:55:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x5382, &(0x7f0000000080)) 19:55:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)=@newtfilter={0x24, 0x2c, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x0, 0xf}}}, 0x24}}, 0x0) 19:55:30 executing program 1: io_setup(0x6, &(0x7f0000000200)=0x0) r1 = socket$packet(0x11, 0x2, 0x300) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 19:55:30 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000400)) 19:55:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0x0, 0x0, 0x0, 0x1442}, 0x40) 19:55:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x278, 0xffffffff, 0xffffffff, 0x278, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x260) 19:55:30 executing program 1: setregid(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) dup3(r0, r1, 0x80000) 19:55:31 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 352.034997][T10653] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 352.041793][T10653] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 352.058952][T10653] loop3: p2 start 4127655699 is beyond EOD, truncated [ 352.066038][T10653] loop3: p3 start 4081519727 is beyond EOD, truncated [ 352.073963][T10660] FAT-fs (loop4): bogus number of reserved sectors 19:55:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) [ 352.081959][T10653] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 352.092673][T10653] loop3: p5 start 3564482375 is beyond EOD, truncated [ 352.099963][T10653] loop3: p6 start 241155593 is beyond EOD, truncated [ 352.109884][T10660] FAT-fs (loop4): Can't find a valid FAT filesystem 19:55:31 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 19:55:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_read_part_table(0x0, 0x38e, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63fb1a7047af75d48df109167dda7845b8c5a7dd2fa6073dc2771d5ce82588cb09be5f0e9383762a3adfde41dd830117f769c4dbb3a627e4084f31e12195412cee39b1c94b2a4e02a1e1e9fc6901d394f749dd1e62d129b505a0dcc1201f9db7619bb9398762e4bf055f9ad7515a4e5ff3da75fc9f3ce0d137db1750fbc556ebeee2b91df24c1d1b4a0288e23e966887c136bfba331d505f82e0e7f626e0e1090a725d6b13603df8b613eb3dd3682627302673051847aa39cedfc4ad1badb46b39b730aeff5da7d16dd63bbe36031f97a6c4e5468968996d1081e5497c2e092fead88bf454", 0x1c9}]) 19:55:31 executing program 0: openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_setup(0x8000, &(0x7f0000000380)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 19:55:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xc0189436, 0x0) [ 352.266064][T10660] FAT-fs (loop4): bogus number of reserved sectors [ 352.286624][T10660] FAT-fs (loop4): Can't find a valid FAT filesystem [ 352.296198][T10687] fuse: Bad value for 'fd' 19:55:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 19:55:31 executing program 1: socket(0x2c, 0x3, 0x10004) [ 352.456399][T10683] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:55:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x12, 0xc, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:31 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f00000014c0)={[{@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@flush='flush'}, {@fat=@check_normal='check=normal'}]}) 19:55:31 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2284, &(0x7f0000000080)=0x3) [ 352.585493][T10701] loop3: [POWERTEC] p1 p2 p3 p4 p5 p6 [ 352.598382][T10701] loop3: p1 size 2178421545 extends beyond EOD, truncated [ 352.614880][T10701] loop3: p2 start 4127655699 is beyond EOD, truncated [ 352.621937][T10701] loop3: p3 start 4081519727 is beyond EOD, truncated 19:55:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) [ 352.654764][T10701] loop3: p4 size 2221362797 extends beyond EOD, truncated [ 352.671010][T10701] loop3: p5 start 3564482375 is beyond EOD, truncated [ 352.690256][T10701] loop3: p6 start 241155593 is beyond EOD, truncated [ 352.697549][T10716] FAT-fs (loop5): bogus number of reserved sectors 19:55:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x4e, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 352.715847][T10716] FAT-fs (loop5): Can't find a valid FAT filesystem [ 352.785799][T10716] FAT-fs (loop5): bogus number of reserved sectors [ 352.853163][T10716] FAT-fs (loop5): Can't find a valid FAT filesystem 19:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:32 executing program 0: syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[], 0x0) 19:55:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 19:55:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x4a, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:32 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:55:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@generic={0x5}, @call]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 19:55:32 executing program 4: keyctl$instantiate(0x13, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'user:', '!:&%]$'}, 0x2f, 0x0) 19:55:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 19:55:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:32 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x0, 0x8}, 0xc) 19:55:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df2015", 0x10, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, {[@hopopts={0x0, 0x1, [], [@generic={0x81}, @jumbo]}]}}}}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 19:55:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) [ 353.520220][T10782] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 353.588670][T10767] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:55:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab0080001100000046000107070000141900110010000ca000005068000000400000ef38bf461e59d7", 0x39}], 0x1) 19:55:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df2015", 0x10, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, {[@hopopts={0x0, 0x1, [], [@generic={0x81}, @jumbo]}]}}}}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 353.734275][T10796] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 19:55:32 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 19:55:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1}}) 19:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:33 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@dev, @broadcast, @val, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @private0, @local, @loopback}}}}, 0x0) 19:55:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df2015", 0x10, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, {[@hopopts={0x0, 0x1, [], [@generic={0x81}, @jumbo]}]}}}}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 19:55:33 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000001140)=[{0x0, 0x0, 0x102}]) 19:55:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df2015", 0x10, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, {[@hopopts={0x0, 0x1, [], [@generic={0x81}, @jumbo]}]}}}}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 19:55:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x227a, &(0x7f0000000080)) 19:55:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0, 0x0, 0x3}], 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000040)="80d8737a6c", 0x5, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r1, &(0x7f0000000240)="73fa46f8bf09ab6e7b1dee79d827383a62aa83935b7ed5ca5c14d70409a996a1de1cf7f93a4586204c034bd8e0c941d600006b", 0x33, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000000140)="2d89dbe28eb02cba0010a900000000000000", 0x12) recvmmsg(r1, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/79, 0x45}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, 0x0, 0x810) 19:55:33 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000140)={'macvtap0\x00', @ifru_names}) 19:55:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) keyctl$describe(0x6, r0, 0x0, 0x0) [ 354.469012][T10842] Dev loop3: unable to read RDB block 1 [ 354.474738][T10842] loop3: unable to read partition table [ 354.495370][T10842] loop3: partition table beyond EOD, truncated 19:55:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, 0x0) 19:55:33 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001080)={&(0x7f0000002180)=ANY=[], 0x1010}}, 0x0) [ 354.545108][T10842] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 19:55:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:55:34 executing program 0: io_setup(0x19, &(0x7f0000000040)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 19:55:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000001140)=[{0x0, 0x0, 0x102}]) 19:55:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2272, &(0x7f0000000080)) 19:55:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)={[{@check_strict='check=strict'}]}) 19:55:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000480)={0x14, 0x2, 0x1, 0x5}, 0x14}}, 0x0) 19:55:34 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 19:55:34 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:55:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x2}, 0x20) [ 355.229391][T10879] Dev loop3: unable to read RDB block 1 [ 355.256870][T10879] loop3: unable to read partition table 19:55:34 executing program 0: add_key(&(0x7f0000000180)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "0193c77c67ac7d6b5c36a3de4a95a620ae92b84474bcdb0d20a0af1cc1e56621db40d780d9a83f40d98fd29937b8e7e864020edd5d85feb32928ba925672b262"}, 0x48, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r0, 0x0) 19:55:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, 0x0, 0x0) [ 355.298320][T10879] loop3: partition table beyond EOD, truncated 19:55:34 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x300}, 0x0) [ 355.374200][T10879] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x894c, 0x0) 19:55:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], 0x110}}, 0x0) 19:55:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000001140)=[{0x0, 0x0, 0x102}]) 19:55:34 executing program 0: socketpair(0x0, 0x80c, 0x0, &(0x7f0000000040)) 19:55:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 19:55:34 executing program 2: prctl$PR_GET_DUMPABLE(0x27) 19:55:34 executing program 5: timer_create(0x3, &(0x7f0000001100)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000001140)) 19:55:34 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0xab737b1007f09cb7) 19:55:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="10"], 0x110}}, 0x0) 19:55:34 executing program 1: prctl$PR_GET_DUMPABLE(0x34) 19:55:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x2, 0x0, 0x0) [ 355.628278][T10916] Dev loop3: unable to read RDB block 1 [ 355.633972][T10916] loop3: unable to read partition table [ 355.649637][T10916] loop3: partition table beyond EOD, truncated [ 355.656131][T10916] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:34 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {0x0}]) 19:55:34 executing program 4: fsopen(&(0x7f0000000140)='fusectl\x00', 0x0) 19:55:34 executing program 2: io_setup(0x19, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) 19:55:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000002c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:34 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x10}, 0x10}}, 0x0) 19:55:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) 19:55:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x5385, &(0x7f0000000080)) 19:55:34 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x6, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 355.898416][T10940] Dev loop3: unable to read RDB block 1 [ 355.904158][T10940] loop3: unable to read partition table [ 355.916806][T10940] loop3: partition table beyond EOD, truncated 19:55:34 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0x0) 19:55:34 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x103001, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'trylock', ' ', 'mem'}, 0xc) 19:55:34 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x4020940d, &(0x7f0000000080)=0x4) [ 355.963680][T10940] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 19:55:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {0x0}]) 19:55:35 executing program 5: prctl$PR_GET_DUMPABLE(0x28) 19:55:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast2, 0x0, r1}) 19:55:35 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) connect$netlink(r0, &(0x7f00000012c0), 0xc) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001200)={0x20}, 0x20}}, 0x0) 19:55:35 executing program 2: clock_gettime(0x7, &(0x7f00000006c0)) 19:55:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @local}}) 19:55:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x1c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}]}]}]}, 0x30}}, 0x0) 19:55:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000005c0)={'batadv_slave_0\x00'}) 19:55:35 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0) 19:55:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @bcast}, @xdp, @qipcrtr={0x2a, 0x0, 0x3ffd}}) 19:55:35 executing program 0: keyctl$instantiate(0x5, 0x0, 0x0, 0x0, 0x0) [ 356.344729][T10977] Dev loop3: unable to read RDB block 1 [ 356.356917][T10977] loop3: unable to read partition table 19:55:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 356.385195][T10977] loop3: partition table beyond EOD, truncated [ 356.394536][T10977] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {0x0}]) 19:55:35 executing program 1: timer_create(0x0, &(0x7f0000002080)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 19:55:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @private0}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 19:55:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x13, &(0x7f00000002c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40080100}) 19:55:35 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000340)={0x14, 0x453, 0x0, 0x0, 0x0, '+'}, 0x14}}, 0x0) 19:55:35 executing program 5: io_setup(0xeedc, &(0x7f00000000c0)) 19:55:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x6, 0x0, 0x0) [ 356.633474][T11007] Dev loop3: unable to read RDB block 1 [ 356.644901][T11007] loop3: unable to read partition table [ 356.675966][T11007] loop3: partition table beyond EOD, truncated [ 356.690457][ T34] audit: type=1107 audit(1607457335.653:11): pid=11013 uid=0 auid=0 ses=4 subj==unconfined msg='+' [ 356.718888][T11007] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:36 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x20082) 19:55:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2282, &(0x7f0000000080)) 19:55:36 executing program 1: clone(0x85b65f00, 0x0, 0x0, 0x0, 0x0) 19:55:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0x8940, &(0x7f0000000180)={0x0, 0x0, "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", "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"}) 19:55:36 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)}]) 19:55:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 19:55:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 19:55:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r0, 0x84, 0x11, 0x0, &(0x7f00000000c0)=0x9b) 19:55:36 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={0x0, 0x1010}}, 0x0) 19:55:36 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x227d, 0x0) 19:55:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1000000}) [ 357.373394][T11040] Dev loop3: unable to read RDB block 1 [ 357.397916][T11040] loop3: unable to read partition table [ 357.403675][T11040] loop3: partition table beyond EOD, truncated 19:55:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) [ 357.447257][T11040] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:36 executing program 2: setuid(0xee00) socket$packet(0x2c, 0x0, 0x300) 19:55:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x101}, 0x1c) 19:55:36 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40284504, &(0x7f00000001c0)=[0x2ff]) 19:55:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x4, 0x0, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:36 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)}]) [ 357.708699][T11069] Dev loop3: unable to read RDB block 1 [ 357.715570][T11069] loop3: unable to read partition table [ 357.724305][T11069] loop3: partition table beyond EOD, truncated [ 357.731272][T11069] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f00000002c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 19:55:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x3a, &(0x7f0000000080)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:55:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000001240), 0x4) 19:55:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x80041284, &(0x7f0000000040)) 19:55:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)}]) 19:55:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:37 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 19:55:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x4, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:37 executing program 5: socketpair(0x28, 0x0, 0x0, &(0x7f00000001c0)) [ 358.189976][T11092] Dev loop3: unable to read RDB block 1 [ 358.213350][T11092] loop3: unable to read partition table 19:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, 0x0, 0x6) 19:55:37 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0xc0189436, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) [ 358.237945][T11092] loop3: partition table beyond EOD, truncated [ 358.249169][T11092] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63", 0xe5}]) 19:55:37 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f00000001c0)=[0x2ff]) 19:55:37 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x528}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 19:55:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8946, &(0x7f00000001c0)={'sit0\x00', 0x0}) 19:55:37 executing program 2: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f00000002c0)='7', 0x1}, {&(0x7f0000000340)="15", 0x1, 0xffffffffffffffff}, {&(0x7f00000004c0)='!', 0x1, 0x8001}], 0x0, 0x0) [ 358.366422][T11113] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 19:55:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) socketpair(0x10, 0x2, 0xfffffe01, &(0x7f0000000000)) 19:55:37 executing program 5: pselect6(0x0, 0x0, &(0x7f0000002b80), 0x0, &(0x7f0000002c00)={0x0, 0x3938700}, 0x0) [ 358.469863][T11116] Dev loop3: unable to read RDB block 1 [ 358.475499][T11116] loop3: unable to read partition table [ 358.522403][T11116] loop3: partition table beyond EOD, truncated [ 358.578882][T11116] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000001140)=[{0x0, 0x0, 0x102}, {&(0x7f0000002300)="4b626196a9d65ebe18e627ec1bdba6dba34aea6a89630f8a4560c34fdcf593a4532e9621aa8fdfa02913d8810e4269342cd8e4dd11e0a64f58b4d347fb9b33aa130707f6b45b84baeddd6761e35527daacf879f4c13cb7a8d42aed4f6f0c47f348ba05bc4a40d528ce7b84dca1697c527cfdf7cc6f2da8025b78ecde15ef0c296cdde8ecd9c165436e7affcc6a73b31c133e19096a193e354ec99640bda89eb31ef3132ac8c47de0f97e141f8b6ad0972452b3640de60c58d8f3a798ffa173b95d0a721ff11f936b43a0b2167a1078cc6d4e678459c7e370f3dd7ff9070cb61bb7dd65cc63", 0xe5}]) 19:55:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x4, 0xa, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001200)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001300)={&(0x7f00000011c0), 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x30, r2, 0x1, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20800}, 0x20000010) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) socket(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) syz_genetlink_get_family_id$batadv(0x0) 19:55:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xe6, &(0x7f0000000080)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:55:37 executing program 5: pselect6(0x40, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={0x40}, &(0x7f0000000480), &(0x7f0000000500)={&(0x7f00000004c0)={[0x1f]}, 0x8}) [ 358.758639][T11138] Dev loop3: unable to read RDB block 1 [ 358.765705][T11138] loop3: unable to read partition table [ 358.781441][T11138] loop3: partition table beyond EOD, truncated 19:55:37 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 358.811883][T11138] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:55:37 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80ffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:55:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xfffffff7, 0x0, 0x39a7}, 0x40) [ 456.738353][ T5] Bluetooth: hci3: command 0x0406 tx timeout [ 456.749661][ T5] Bluetooth: hci4: command 0x0406 tx timeout [ 456.762418][ T5] Bluetooth: hci5: command 0x0406 tx timeout [ 477.778392][ T9796] Bluetooth: hci0: command 0x0406 tx timeout [ 477.796589][ T9796] Bluetooth: hci1: command 0x0406 tx timeout [ 477.807480][ T9796] Bluetooth: hci2: command 0x0406 tx timeout [ 548.878502][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 548.885736][ C1] rcu: 1-....: (10375 ticks this GP) idle=73e/1/0x4000000000000000 softirq=14305/14306 fqs=5167 [ 548.896625][ C1] (t=10500 jiffies g=14073 q=431) [ 548.902052][ C1] NMI backtrace for cpu 1 [ 548.906358][ C1] CPU: 1 PID: 11163 Comm: syz-executor.4 Not tainted 5.10.0-rc7-syzkaller #0 [ 548.915263][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.925293][ C1] Call Trace: [ 548.928580][ C1] [ 548.931451][ C1] dump_stack+0x107/0x163 [ 548.935772][ C1] nmi_cpu_backtrace.cold+0x44/0xd7 [ 548.941141][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 548.946322][ C1] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 548.952297][ C1] rcu_dump_cpu_stacks+0x1e3/0x21e [ 548.957415][ C1] rcu_sched_clock_irq.cold+0x472/0xee8 [ 548.962940][ C1] ? rcutree_dead_cpu+0x40/0x40 [ 548.967768][ C1] ? lock_downgrade+0x6d0/0x6d0 [ 548.972597][ C1] ? __raise_softirq_irqoff+0x93/0x1d0 [ 548.978033][ C1] update_process_times+0x77/0xd0 [ 548.983140][ C1] tick_sched_handle+0x9b/0x180 [ 548.987968][ C1] tick_sched_timer+0x1d1/0x2a0 [ 548.992810][ C1] ? can_stop_idle_tick+0x290/0x290 [ 548.997983][ C1] __hrtimer_run_queues+0x1ce/0xea0 [ 549.003598][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 549.009659][ C1] ? ktime_get_update_offsets_now+0x249/0x320 [ 549.015737][ C1] hrtimer_interrupt+0x334/0x940 [ 549.020670][ C1] __sysvec_apic_timer_interrupt+0x146/0x540 [ 549.027037][ C1] sysvec_apic_timer_interrupt+0x48/0x100 [ 549.032763][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 549.038724][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x25/0x50 [ 549.045297][ C1] Code: f8 5d c3 66 90 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 ca 3a 6e f8 48 89 ef e8 52 ef 6e f8 f6 c7 02 75 1a 53 9d 01 00 00 00 e8 61 5b 63 f8 65 8b 05 8a 05 1a 77 85 c0 74 0a 5b [ 549.064985][ C1] RSP: 0018:ffffc90000d908f8 EFLAGS: 00000246 [ 549.071119][ C1] RAX: 0000000001ea4ef2 RBX: 0000000000000246 RCX: ffffffff8155a917 [ 549.079064][ C1] RDX: 0000000000000000 RSI: 0000000000000303 RDI: 0000000000000000 [ 549.087099][ C1] RBP: ffff888014e21650 R08: 0000000000000001 R09: ffffffff8ebaf747 [ 549.095137][ C1] R10: fffffbfff1d75ee8 R11: 0000000000000001 R12: dffffc0000000000 [ 549.103084][ C1] R13: 0000000000000080 R14: ffff888021053850 R15: 0000000000000000 [ 549.111188][ C1] ? mark_lock+0xf7/0x1730 [ 549.115845][ C1] ieee80211_rx_handlers+0x3b5b/0xae50 [ 549.121285][ C1] ? sched_clock+0x2a/0x40 [ 549.125675][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 549.130505][ C1] ? ieee80211_process_sa_query_req+0x8b0/0x8b0 [ 549.136719][ C1] ? asm_sysvec_irq_work+0x12/0x20 [ 549.141807][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 549.147003][ C1] ? asm_sysvec_irq_work+0x12/0x20 [ 549.152318][ C1] ? ieee80211_prepare_and_rx_handle+0x129b/0x6360 [ 549.158929][ C1] ieee80211_prepare_and_rx_handle+0x2482/0x6360 [ 549.165254][ C1] ? ieee80211_mark_rx_ba_filtered_frames+0x740/0x740 [ 549.172262][ C1] ? sta_info_get+0x380/0x380 [ 549.176918][ C1] ? ieee80211_scan_rx+0x1e7/0x7c0 [ 549.182013][ C1] ieee80211_rx_list+0xdf3/0x23d0 [ 549.187192][ C1] ? ieee80211_prepare_and_rx_handle+0x6360/0x6360 [ 549.193701][ C1] ? asm_sysvec_irq_work+0x12/0x20 [ 549.198793][ C1] ? ieee80211_rx_napi+0x305/0x3d0 [ 549.203883][ C1] ieee80211_rx_napi+0xf7/0x3d0 [ 549.208721][ C1] ? ieee80211_rx_list+0x23d0/0x23d0 [ 549.214073][ C1] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 549.220050][ C1] ieee80211_tasklet_handler+0xd3/0x130 [ 549.225585][ C1] tasklet_action_common.constprop.0+0x22f/0x2d0 [ 549.231903][ C1] __do_softirq+0x2a0/0x9f6 [ 549.236392][ C1] asm_call_irq_on_stack+0xf/0x20 [ 549.241647][ C1] [ 549.244563][ C1] do_softirq_own_stack+0xaa/0xd0 [ 549.249578][ C1] irq_exit_rcu+0x132/0x200 [ 549.254178][ C1] sysvec_apic_timer_interrupt+0x4d/0x100 [ 549.259960][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 549.265918][ C1] RIP: 0010:unlock_page_memcg+0xa/0x160 [ 549.271439][ C1] Code: ba 01 00 00 00 be 01 00 00 00 e8 21 d0 ff ff f7 db eb a9 e8 68 d1 fa ff eb cf 66 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df <53> 48 89 fb 48 83 c7 08 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 15 [ 549.291295][ C1] RSP: 0018:ffffc90000fef790 EFLAGS: 00000296 [ 549.297435][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff81a63373 [ 549.305498][ C1] RDX: ffff88802b4e3480 RSI: ffffffff81a628c2 RDI: ffffea0001b45000 [ 549.313456][ C1] RBP: ffffea0001b45000 R08: 0000000000000000 R09: ffffea0001b45007 [ 549.321508][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 549.329486][ C1] R13: ffff888014dd6d60 R14: dffffc0000000000 R15: 00007f07c7dad000 [ 549.337476][ C1] ? page_remove_rmap+0xb93/0x1c00 [ 549.342573][ C1] ? page_remove_rmap+0xe2/0x1c00 [ 549.347587][ C1] unmap_page_range+0xe30/0x2640 [ 549.352535][ C1] ? vm_normal_page_pmd+0x510/0x510 [ 549.357738][ C1] unmap_single_vma+0x198/0x300 [ 549.362566][ C1] unmap_vmas+0x168/0x2e0 [ 549.366957][ C1] ? zap_vma_ptes+0x100/0x100 [ 549.371617][ C1] exit_mmap+0x2b1/0x530 [ 549.375979][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 549.381966][ C1] ? __khugepaged_exit+0x2d9/0x3f0 [ 549.387062][ C1] __mmput+0x122/0x470 [ 549.391115][ C1] mmput+0x53/0x60 [ 549.394986][ C1] do_exit+0xa72/0x29b0 [ 549.399124][ C1] ? find_held_lock+0x2d/0x110 [ 549.403955][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 549.409315][ C1] ? get_signal+0x34f/0x1f10 [ 549.413883][ C1] ? lock_downgrade+0x6d0/0x6d0 [ 549.418746][ C1] do_group_exit+0x125/0x310 [ 549.423325][ C1] get_signal+0x42a/0x1f10 [ 549.427725][ C1] ? sched_clock+0x2a/0x40 [ 549.432133][ C1] arch_do_signal+0x82/0x2390 [ 549.436875][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 549.442063][ C1] ? asm_sysvec_irq_work+0x12/0x20 [ 549.447446][ C1] ? copy_siginfo_to_user32+0xa0/0xa0 [ 549.452810][ C1] ? blkcg_maybe_throttle_current+0x64d/0xd80 [ 549.458902][ C1] ? __blkcg_punt_bio_submit+0x1d0/0x1d0 [ 549.464526][ C1] ? mem_cgroup_move_account+0xf60/0xf60 [ 549.470153][ C1] exit_to_user_mode_prepare+0x100/0x1a0 [ 549.475771][ C1] syscall_exit_to_user_mode+0x38/0x260 [ 549.481300][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 549.487167][ C1] RIP: 0033:0x45e0f9 [ 549.491052][ C1] Code: Unable to access opcode bytes at RIP 0x45e0cf. [ 549.497889][ C1] RSP: 002b:00007f07c7541c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 549.506288][ C1] RAX: 0000000020ffc000 RBX: 0000000000000006 RCX: 000000000045e0f9 [ 549.514250][ C1] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffc000 [ 549.522236][ C1] RBP: 000000000119c128 R08: 0000000000000004 R09: 0000000000000000 [ 549.530225][ C1] R10: 0000000000000011 R11: 0000000000000246 R12: 000000000119c0dc [ 549.538185][ C1] R13: 00007ffee016e75f R14: 00007f07c75429c0 R15: 000000000119c0dc