0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:15 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a048000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x5, 0x6a, 0xb8, 0x0, 0x0, 0x8ed, 0x24022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x40000, 0x0, 0x0, 0x7, 0xfffffffffffffffc}, 0x0, 0x4, r2, 0x9) write$nbd(r2, &(0x7f00000000c0)={0x67446698, 0x0, 0x2, 0x2, 0x1, "d09609b6963ec100a8a9e1d962a0031644c35d40a1dfa4f690c55ff569adedd94bb70b0401799568f27875d4b58adc0e51f2455569d6580ea5d526e0d8a94c3e1659dcbb3c57eb2fd11dc95cc8364a2f2fcc2a55fe96bb041472f1e2dab3891bca0fb48206bf1abb46ec432eac0fd861b921c54088e6cb07fb0befff1a1f2a832d23ed44fbad3a487b631ab679eeea94e3dba295573901c54322c11a962048b34cd47588c3eee74536fb0e262091237556250213f754d49688b287815134"}, 0xce) 14:49:15 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000afdef00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1786.155537][ T6771] loop5: p1 p2 p3[EZD] p4 [ 1786.163641][ T6771] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1786.185732][ T6771] loop5: p2 size 100663296 extends beyond EOD, truncated [ 1786.213513][ T6771] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1786.229286][ T6771] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:16 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x29c, 0x1, 0x3, 0x3, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x1c}}, @NFQA_CT={0xbc, 0xb, 0x0, 0x1, [@CTA_NAT_DST={0x20, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @loopback}]}, @CTA_SYNPROXY={0x24, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x7}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}]}, @CTA_PROTOINFO={0x18, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x14, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x7}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x7f}]}}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7ff}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x1}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x10001}, @CTA_LABELS_MASK={0x8, 0x17, [0x6de3]}, @CTA_PROTOINFO={0x30, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x40}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}]}}]}, @NFQA_PAYLOAD={0x2e, 0xa, "1bc6c3697979bb3fcec89e9006b42e43ea9a84db266ec084e8838bebb99caa4fff2e4609923f002f2aab"}, @NFQA_CT={0x48, 0xb, 0x0, 0x1, [@CTA_SYNPROXY={0x44, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9d8c}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x4b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x1000}]}]}, @NFQA_CT={0xec, 0xb, 0x0, 0x1, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_SEQ_ADJ_ORIG={0x24, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xbd}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_NAT_DST={0xac, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @private=0xa010100}, @CTA_NAT_V6_MINIP={0x14, 0x4, @ipv4={[], [], @empty}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @empty}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010101}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast2}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xc2}]}, @NFQA_PAYLOAD={0x47, 0xa, "267732e0291e8024018ff0bf0366a9d1c68f3bcd5579a30c6f2ef2bb8154a52d68e5a525fd3a9bab385e3c82d91d446aaefbf19449ed3e2b1db594b093e6965623eaa8"}, @NFQA_VLAN={0x14, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x1}]}]}, 0x29c}, 0x1, 0x0, 0x0, 0x400d0}, 0x4000004) 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000aeffd00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) timerfd_gettime(r0, &(0x7f0000000000)) 14:49:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x5, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000200877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x5}, 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000000)={0xfffffff9, &(0x7f00000001c0)="fac61f91e020751b9c2e4b9439022bb9c37f6dedff16e7ee8118146ecfaa11a6f8dbf7a982df1fff6bc83108913fc3a7b3cac9cfe2a38205087a7c7ab6301955becb71142e7e2b985d32af1f664cf3515cf13daa6f06c5e1022c00d68e54649d3692b33173f91d83156d6faacda0f4a26fb66e6324c9f191ac946459b9345dd6291d2fd8b0f4aa33749b3d82db840d3c99fcdd1fe284d34f91f796162eddb97a2b93b49f831c3dd0749746d04bc1bf4609dac4f83e607c306d6bdab0d47a73df305cafac71bf0095112e5342e20454549c6699103741a64e7c0d70b54ae7270a05172942"}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = socket$inet(0x2, 0x4, 0x5) r3 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r3, 0x0) sendfile(r2, r3, 0x0, 0x800) ioctl$TIOCSBRK(r1, 0x5427) 14:49:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000300877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1786.859613][ T6802] loop5: p1 p3[EZD] p4 [ 1786.875179][ T6802] loop5: p1 size 11290111 extends beyond EOD, truncated 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000400877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1786.903980][ T6802] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000500877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000600877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f0000000000)) 14:49:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:16 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000700877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1787.096401][ T6840] loop5: p1 p3[EZD] p4 [ 1787.102041][ T6840] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1787.118374][ T6840] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x5}, 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000800877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x1000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0xfeeb) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x74, 0x4, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000) r5 = socket$tipc(0x1e, 0x5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) io_cancel(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x2, r5, &(0x7f00000000c0)="c517bd31d78ad26d707f9d565b96c39c3fc2a0043e033ae5f93526b7707c0859ee99192c12f5a182a53a9b59081c6851870caf70bf7bf4e28274d43b27f66eaef12d0048f4ce0d928f85d1b737b3b652", 0x50, 0x6, 0x0, 0x3, r8}, &(0x7f0000000140)) 14:49:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000900877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000a00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000b00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000c00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:17 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000d00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1787.875394][ T6864] loop5: p1 p3[EZD] p4 [ 1787.882265][ T6864] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1787.909197][ T6864] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x5}, 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000e00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x4, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_mr_cache\x00') fchdir(r0) r1 = accept(r0, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000000)=0x80) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={r5, @remote, @local}, 0xc) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r2, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}]}, 0x70}, 0x1, 0x0, 0x0, 0xe2}, 0x20000000) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x91) sendto$unix(r4, &(0x7f0000000280)="3d02426fe0d231e782fe21939084a7b7b8f191432c0c93f85362472c22cf29cf83e96fc055a376b31b492dd2f3e9ae889ab6c0e9fc43daa4dae8575b61a184251f455d29c003031b5344875f23f3df2a25b6ff6e6112a134dccf9629ccef21e744737143a504cefa3430fee881d7d59b6a701c8a6e7135387147", 0x7a, 0x80, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) setsockopt$sock_void(r7, 0x1, 0x1b, 0x0, 0x0) 14:49:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a001000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a001100877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a001200877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) [ 1788.788788][ T6894] loop5: p1 p3[EZD] p4 [ 1788.793540][ T6894] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1788.805262][ T6894] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a001c00877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) faccessat(r0, &(0x7f00000000c0)='.\x00', 0x20) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) sched_setattr(r3, &(0x7f0000000000)={0x38, 0x0, 0x40, 0x3, 0xae4, 0x7ff, 0x6, 0x0, 0xfff, 0x3}, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a002600877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x6, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10080, 0x0) write$tun(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="000186dd06100002aaaaaaaaaabbff020000000000000000000000000001016bc200000120010000000000000000000000000002"], 0x34) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x0) keyctl$describe(0x6, r2, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000000c0)=0xffffffc1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000000)) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000402877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x3) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000003877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000204877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xeeadd7b22199aa1a, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000604877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a008004877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000005877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1789.676909][ T6930] loop5: p1 p3[EZD] p4 [ 1789.681343][ T6930] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1789.700707][ T6930] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1789.818261][ T6958] loop5: p1 p3[EZD] p4 [ 1789.824349][ T6958] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1789.835703][ T6958] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xd, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a002d05877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xb, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1789.966641][ T6973] loop5: p1 p3[EZD] p4 [ 1789.977861][ T6973] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1789.987200][ T6973] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000006877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = clone3(&(0x7f0000000340)={0x4000000, &(0x7f00000003c0), &(0x7f0000000100), &(0x7f0000000140), {0x7}, &(0x7f0000000180)=""/170, 0xaa, &(0x7f0000000240)=""/179, &(0x7f0000000300)=[0x0, 0xffffffffffffffff, r1], 0x3, {r4}}, 0x58) ptrace$pokeuser(0x6, r5, 0x8, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) 14:49:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x14, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x38, r2, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x24, 0xe, "080fec1b94dc5b4f3ee83ea2a259123e3a79acfe0b10083f5465cd9670f1e4d1"}]}, 0x38}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x2}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x3c}}, 0x40004) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') 14:49:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000406877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000007877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000009877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000a877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1790.625809][ T6992] loop5: p1 p3[EZD] p4 [ 1790.630154][ T6992] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1790.637745][ T6995] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1790.646423][ T6992] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x108, 0x0, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@CTA_EXPECT_MASK={0xe4, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @ipv4={[], [], @multicast2}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @ipv4={[], [], @empty}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x6}, @CTA_EXPECT_ZONE={0x6}]}, 0x108}, 0x1, 0x0, 0x0, 0x400c1}, 0x24000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x401a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x6, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xd, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000b877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000c877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x40) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES16=r2], 0x34}, 0x1, 0x0, 0x0, 0x4044052}, 0x0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x60b2e13d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc00}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x22068081}, 0x4000) ioctl$VT_DISALLOCATE(r1, 0x5608) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xa, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x1c, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xe, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000d877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1790.815834][ T7025] loop5: p1 p3[EZD] p4 [ 1790.820153][ T7025] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1790.849029][ T7025] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000e877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000011877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x804, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth1_to_hsr\x00', {0x2, 0x4e22, @remote}}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000012877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1790.994083][ T7047] loop5: p1 p3[EZD] p4 [ 1791.005659][ T7047] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1791.033264][ T7047] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00001c877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x29, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x4000}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x10, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000026877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00052d877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1791.185507][ T7072] loop5: p1 p3[EZD] p4 [ 1791.190300][ T7072] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1791.214247][ T7072] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x11, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00003f877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000040877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000480877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1791.386861][ T7084] loop5: p1 p3[EZD] p4 [ 1791.391412][ T7084] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1791.422868][ T7084] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000140)=""/255, &(0x7f0000000000)=0xff) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2b, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:21 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4000}, 0x31, &(0x7f0000001580)={&(0x7f0000001600)=ANY=[@ANYBLOB="14000010", @ANYRES16=r0, @ANYBLOB="00042cbd7000ffdbdf35020000003d163d431df8bacf656896b084418bea286682136b836fce59e408e1f502ed52a1845efb1cf28841a842d5a299483a41acfdee"], 0x14}}, 0x4020084) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r1, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) io_submit(0x0, 0x2, &(0x7f0000000680)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0xaf, r5, &(0x7f0000000440)="28b5d0ef363a817c9fbd04d063c4455266b1f3600835f6ef010dd808e19a19dfe0a3085f423132ef740346450badd7cb4a98974581660d14c9b90cb7ae6341356ea44e7aadde8832ebd61024fd58282c5d7a0a0724ecdbaebf1a45ebe794d2ef2ce39d9ff4aafa7c7e2dd10192ba9b6b90f9de77365db797c14b7e97ebb07beb8e323ad49d4a05d31ffe58622b30fe8a0fc33f7b5f44cb4cc8f3840856926f184a8165ca623e8f6a183ba8a7f60032c33de3043ac42e91a347fa3c66714092b81d6a984022e40fe92afe8d077c3304853bf7cf9037992150a528369caa236f2fddc050758d0a29c4bde6b246c72315b3", 0xf0, 0xfffffffffffffff9, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000540)="9762f39ce4b23ff662d7f87ea5e5ccb5ee941d5744d92ebf734252bf4c2631867421e593551a92d849288f5cdbb3db68020c44d507dcb2f587125dffebc2bf20f978decaa2d2f1d7c82564bbe942ba96d42520f2219ed9501c70a46786ed83b91b58bd498495e130522205ae8800b11ebb28d7bb1c195dcba7c5ec90f63bc2d78cf6a72f085bc55bb301d987be4937442e699103688d88b9344689caebf38c493648109a5a9202f2f1a3e3e215dc886b0feef21d648007bfa22e62c2b9b9795d46ed5f01c88e4557e5f5bc95dca926e8861f4ec9e004f1e81b53ac4614e936996d3fb387bd3250c930809d16b35cbf5d936ad52637a15e035b", 0xf9, 0x8, 0x0, 0x1}]) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f00000000c0)={@empty, @private, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000200)={'erspan0\x00', 0x0, 0x10, 0x80, 0x7ff, 0x6, {{0xc, 0x4, 0x1, 0x2b, 0x30, 0x65, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@end, @ssrr={0x89, 0x7, 0x73, [@rand_addr=0x64010100]}, @timestamp_prespec={0x44, 0x14, 0x5e, 0x3, 0x7, [{@private=0xa010102, 0x1}, {@local, 0x6e3}]}]}}}}}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x2, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r9, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r11, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xd0, r0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40005}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x1c00}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00fdef877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x12, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00effd877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000002877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000003877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000004877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1791.907316][ T7105] loop5: p1 p3[EZD] p4 [ 1791.923097][ T7105] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1791.938524][ T7101] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 14:49:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000005877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x56, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1791.949232][ T7105] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1792.068881][ T7130] loop5: p1 p3[EZD] p4 [ 1792.075471][ T7130] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1792.083418][ T7130] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000140)=""/255, &(0x7f0000000000)=0xff) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000006877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2c, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x104, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/84) fchdir(r0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000007877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000008877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000009877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000a877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000b877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000c877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1792.817674][ T7140] loop5: p1 p3[EZD] p4 [ 1792.822076][ T7140] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1792.839605][ T7140] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000140)=""/255, &(0x7f0000000000)=0xff) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000d877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1b4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./control\x00', 0xa4000dda) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r5) r6 = accept$inet6(r5, 0x0, &(0x7f00000000c0)) r7 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r7, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r7, 0x0) r8 = accept(r3, 0x0, &(0x7f0000000140)) dup2(r6, r8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000002, 0x40010, 0xffffffffffffffff, 0x8000000) syz_io_uring_complete(r9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:23 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4000000000010048) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r7, r6, 0x0, 0x7ffff000) r8 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r8, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r8, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r8, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x11}, 0x4004001) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000000)) 14:49:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2f, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000e877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000010877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1793.628727][ T22] audit: type=1400 audit(1596725363.040:32): avc: denied { 0x1000000 } for pid=7168 comm="syz-executor.4" path="socket:[289154]" dev="sockfs" ino=289154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=tcp_socket permissive=1 14:49:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000), 0x4) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000011877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000012877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000000)={@private=0xa010101, @local}, 0xc) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000140)=0x68) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x0) [ 1793.677672][ T7173] loop5: p1 p3[EZD] p4 [ 1793.690586][ T7173] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1793.717378][ T7173] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:23 executing program 2 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x304, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00001c877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x3c, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x34}, 0x1, 0x0, 0x0, 0x4044052}, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x134, r1, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x66}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x19}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0xa0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcfe}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x20000011}, 0x840) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000026877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877702720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:23 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877703720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1794.515552][ T7208] loop5: p1 p3[EZD] p4 [ 1794.520327][ T7208] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1794.539075][ T7208] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1794.553092][ T7223] FAULT_INJECTION: forcing a failure. [ 1794.553092][ T7223] name failslab, interval 1, probability 0, space 0, times 0 [ 1794.565772][ T7223] CPU: 0 PID: 7223 Comm: syz-executor.2 Not tainted 5.4.56-syzkaller-00005-g8555f0d9d303 #0 [ 1794.575830][ T7223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1794.585886][ T7223] Call Trace: [ 1794.589182][ T7223] dump_stack+0x14a/0x1ce [ 1794.593513][ T7223] ? devkmsg_release+0x11c/0x11c [ 1794.599413][ T7223] ? show_regs_print_info+0x12/0x12 [ 1794.604611][ T7223] ? memset+0x1f/0x40 [ 1794.608602][ T7223] ? unwind_next_frame+0x1c90/0x2330 [ 1794.613913][ T7223] should_fail+0x6fb/0x860 [ 1794.618343][ T7223] ? setup_fault_attr+0x3d0/0x3d0 [ 1794.623393][ T7223] ? unwind_get_return_address_ptr+0x130/0x130 [ 1794.629552][ T7223] ? iov_iter_advance+0x1e9/0xee0 [ 1794.634580][ T7223] ? __napi_alloc_skb+0xd6/0x520 [ 1794.639509][ T7223] should_failslab+0x5/0x20 [ 1794.644000][ T7223] kmem_cache_alloc+0x36/0x260 [ 1794.648750][ T7223] __napi_alloc_skb+0xd6/0x520 [ 1794.653499][ T7223] ? unwind_get_return_address+0x48/0x90 [ 1794.659142][ T7223] napi_get_frags+0x5c/0x100 [ 1794.663717][ T7223] tun_get_user+0xa10/0x34e0 [ 1794.668294][ T7223] ? tun_do_read+0x1ed0/0x1ed0 [ 1794.673040][ T7223] ? __kasan_slab_free+0x1f2/0x230 [ 1794.678137][ T7223] ? __rcu_read_lock+0x50/0x50 [ 1794.682888][ T7223] ? perf_trace_ext4_mballoc_alloc+0xbda/0xbe0 [ 1794.689034][ T7223] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1794.695093][ T7223] ? __rcu_read_lock+0x50/0x50 [ 1794.699839][ T7223] ? proc_fail_nth_write+0x18f/0x250 [ 1794.705105][ T7223] ? proc_fail_nth_read+0x1d0/0x1d0 [ 1794.710286][ T7223] tun_chr_write_iter+0x121/0x1a0 [ 1794.715299][ T7223] __vfs_write+0x59d/0x720 [ 1794.719703][ T7223] ? __kernel_write+0x340/0x340 [ 1794.724538][ T7223] ? avc_policy_seqno+0x17/0x70 [ 1794.729375][ T7223] ? security_file_permission+0x128/0x300 [ 1794.735089][ T7223] vfs_write+0x217/0x4f0 [ 1794.739319][ T7223] ksys_write+0x18c/0x2c0 [ 1794.743637][ T7223] ? file_open_root+0x450/0x450 [ 1794.748473][ T7223] ? __ia32_sys_read+0x80/0x80 [ 1794.753220][ T7223] do_syscall_64+0xcb/0x150 [ 1794.757708][ T7223] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1794.763584][ T7223] RIP: 0033:0x45ccd9 [ 1794.767489][ T7223] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1794.787080][ T7223] RSP: 002b:00007f0136ac1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1794.795481][ T7223] RAX: ffffffffffffffda RBX: 0000000000038bc0 RCX: 000000000045ccd9 [ 1794.803460][ T7223] RDX: 000000000000006a RSI: 0000000020000280 RDI: 0000000000000003 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877704720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x356, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 1 (fault-call:6 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1794.811447][ T7223] RBP: 00007f0136ac1ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1794.819422][ T7223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1794.827390][ T7223] R13: 00007ffefa40f46f R14: 00007f0136ac29c0 R15: 000000000078bfac 14:49:24 executing program 2 (fault-call:4 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:24 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x5, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x801c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0x2, 0xffffffffffffffff, 0x27bccdcf758690ae) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) ioctl$RTC_UIE_ON(r1, 0x7003) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877705720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x58, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x200}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) splice(r0, &(0x7f0000000000)=0x2, r1, &(0x7f00000000c0)=0x3ff, 0x7fff, 0x7e3b599ce3b04a82) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e21, 0x2, @ipv4={[], [], @rand_addr=0x64010102}, 0x1}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x101, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877706720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x404, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877707720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1794.937528][ T7232] loop5: p1 p3[EZD] p4 [ 1794.941846][ T7232] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1794.968693][ T7232] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x206a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877708720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877709720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r1, &(0x7f0000000140)=@known='trusted.overlay.redirect\x00') keyctl$chown(0x4, r0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, r2) 14:49:24 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087770a720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x600, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1795.149129][ T7266] loop5: p1 p3[EZD] p4 [ 1795.153992][ T7266] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1795.168993][ T7266] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087770b720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x1, 'x'}, &(0x7f0000000180)=0x25) open(&(0x7f0000000100)='./file0\x00', 0x40000, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'syzkaller0\x00', 0x4}, 0x18) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x4}, 0x0, 0x0, 0x100, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) sendto$inet(r2, &(0x7f00000001c0)="36b59c493922d156b8b4c42f5d51d54a54f99192d0a57b82cf2205008eb5c5b862fc009401de368f1ac90cf0099384b86cd9a35ca41ad6c118a2340bdc4b97f622cc0e603b1b7c842f447b7402d7706da00e5a7fa48a456af5b617956f519764d5f6661512267e88cef8674d06036f6451b1", 0x72, 0x20004001, &(0x7f0000000240)={0x2, 0xffff, @empty}, 0x10) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x504, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xd00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087770c720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 4: r0 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r0, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000001, 0x8}) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x30) get_robust_list(r1, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000340)=0x18) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000003c0)={0x5}) r6 = dup2(r4, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) utimensat(r3, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)={{r7, r8/1000+60000}, {0x77359400}}, 0x100) write$9p(r6, &(0x7f0000000140)="c59abf22d9d8574ec5bc43cc78e4ea25b438be054ac5e6fe0ce90349b2c50c11a1ab935af013a74c0a6bac7b57170e", 0x2f) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x39e68a64f89d65ee}}, r1, 0x0, 0xffffffffffffffff, 0x0) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087770d720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087770e720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877710720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877711720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1795.899079][ T7294] loop5: p1 p3[EZD] p4 [ 1795.905648][ T7294] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1795.928655][ T7294] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020300, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x604, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877712720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a00000087771c720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xe80, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877726720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020500, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x190, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x100}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x146}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x7fff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffff6}, {0x6, 0x11, 0x6b}}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x704, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1796.101869][ T7324] loop5: p1 p3[EZD] p4 [ 1796.106481][ T7324] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1796.122308][ T7324] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720230070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720330070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720430070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020600, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720530070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020700, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x6}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1796.327605][ T7347] loop5: p1 p3[EZD] p4 [ 1796.331893][ T7347] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1796.340330][ T7347] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x1400, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720630070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020900, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x804, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x3, 0x3}) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720730070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720830070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720930070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720a30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720b30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1796.496181][ T7379] loop5: p1 p3[EZD] p4 [ 1796.509367][ T7379] loop5: p1 size 11290111 extends beyond EOD, truncated 14:49:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) sendto(r1, &(0x7f0000000000)="58927854d2c03d51d0fd6728416d3a680662c03afff27be31689447f73ce69649ccacef18ead469f37d728781bc6ccffc726745c2d96233c442b069e5a", 0x3d, 0x40048c5, &(0x7f00000000c0)=@rc={0x1f, @fixed={[], 0x10}, 0x9}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) r5 = geteuid() setfsuid(r5) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000002c0)={@broadcast, @multicast1}, &(0x7f0000000300)=0xc) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000140), &(0x7f00000003c0)=0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r6) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/tty/drivers\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f00000001c0), &(0x7f0000000200)=0x4) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./control\x00', 0xa4000dda) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x5, 0x1, 0x6}) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x24766c8680f3a63a, 0x10010, 0xffffffffffffffff, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0xd}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1796.540921][ T7379] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x1c00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020a00, 0x0, 0x0, 0x0, 0x0) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720c30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xa27, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 14:49:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0xa, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r2, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r4, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x35}, r4}, 0x14) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720d30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x11}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020b00, 0x0, 0x0, 0x0, 0x0) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720e30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700721030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1796.818033][ T7416] loop5: p1 p3[EZD] p4 [ 1796.827917][ T7416] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1796.846844][ T7416] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020c00, 0x0, 0x0, 0x0, 0x0) [ 1796.862967][ T7426] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 14:49:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2900, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700721130070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1300, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024002, 0x0, 0x0, 0x0, 0x0) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700721230070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1796.963648][ T7451] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 14:49:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "494fe526dcdd1173", "01800058506be48278872d81a100", "ffffd065", "9b6a01c17331b08a"}, 0x28) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700721c30070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x21}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700722630070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030060081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200300f0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1797.110512][ T7461] loop5: p1 p3[EZD] p4 [ 1797.120745][ T7461] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1797.133741][ T7461] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030100081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2b00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:26 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030110081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2000, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1797.389171][ T7496] loop5: p1 p3[EZD] p4 [ 1797.393501][ T7496] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1797.402277][ T7496] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024003, 0x0, 0x0, 0x0, 0x0) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030120081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x3a}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2200, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2c00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030150081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030160081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030170081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1797.965443][ T7513] loop5: p1 p3[EZD] p4 [ 1797.970324][ T7513] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1798.004583][ T7513] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2400, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x58}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030180081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030190081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1798.225667][ T7538] loop5: p1 p3[EZD] p4 [ 1798.230039][ T7538] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1798.246853][ T7538] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r3, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000) 14:49:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2f00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030210081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2800, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x600}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:28 executing program 4: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x9, 0xffffffffffffffff}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0xfdcc, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'macvlan1\x00', @multicast}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x200, 0x3, 0x1, 0x101, 0x70bd2d, 0x25dfdbff, {0x3, 0x0, 0x4}, [@nested={0xf4, 0x2b, 0x0, 0x1, [@typed={0xdc, 0x2f, 0x0, 0x0, @binary="32ba46ad82d7f69074a29a806763093ed9e4db770578088f22a1b0a32869ff4bc0c5088d27ab8d9eff0e22c5dd7bdf7ee18d0208fe762bb8e7a855197f79cb5cb79c7953606c10a2cd33476876eb3aa54c2990b6eb62d7b0825068f3ae581d9fc997e33aab0b9fd25a1084d0fb6cd7a84ac4bf0d7e27e747bdad2e14ffd312ba83d4e1c6fbe86e67c6b9eb212cde37c4cb19b3cb4f1157b63eecec8b31f5df4e3d9ba2c80fd4181098e23b2e73a07a2194532603d2f8ec60061bc3ca07de71fbab3af4d1d04eec66a7737e04d79479cd39c6e7373c8be8c3"}, @typed={0x14, 0x15, 0x0, 0x0, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}]}, @generic="98e48bb10482bc750eaf896198b5819f00686ee2cdd3336374722bc9004d26891608dac95baa791df5cfb61ae3042f34d3ea133070303fc500859f883b030f2d59fa3e5094ad8ac4ce40f408ea72492875264c2ca4662b702644daf433f4f5649c3d21b2411fe3a1ad05e482cfae5d2e4dc2cf530222b029eb72e19982d5ad1aec7eddd141c0d97173fd3283dbe2e5b1150aa7f46b58e3b5bbaf2f78d9a6cabd47526734823bda624e5af5e6f8a9e6c3622232557738e423bace807e0cdd1ffe9e47eee2f4c1565b68ec70a4d9594fb56c36ee3c259dea4afb9b98dccedfe30a08da5d9b311e467f61e9aa49f96213cee17681826520"]}, 0x200}, 0x1, 0x0, 0x0, 0x40400c4}, 0x0) 14:49:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_usb_connect(0x5, 0x18e8, &(0x7f00000000c0)={{0x12, 0x1, 0x7dcbfe54bb5321b9, 0x76, 0x78, 0xc6, 0xff, 0x1b3d, 0x171, 0xeb75, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x18d6, 0x4, 0x1, 0x0, 0x10, 0x5, [{{0x9, 0x4, 0x91, 0x8, 0xc, 0x9, 0x9b, 0x78, 0x0, [@cdc_ncm={{0x7, 0x24, 0x6, 0x0, 0x1, "e6be"}, {0x5, 0x24, 0x0, 0xb64}, {0xd, 0x24, 0xf, 0x1, 0x4c0b793a, 0x3, 0x1, 0x81}, {0x6, 0x24, 0x1a, 0xed6, 0x6}, [@acm={0x4, 0x24, 0x2, 0xe}, @mbim_extended={0x8, 0x24, 0x1c, 0x4, 0x6, 0x82bf}, @mdlm_detail={0x23, 0x24, 0x13, 0x20, "739a49269002c2846564b9b7e8bfd1f85873b3f02e2d03b3b02fb1578037fd"}, @country_functional={0x12, 0x24, 0x7, 0x0, 0x1000, [0x7f, 0xfe01, 0xf800, 0x2, 0x7, 0x147]}, @mdlm_detail={0x87, 0x24, 0x13, 0x3, "c2e9493ad4b868aef86ab4d2bf35f8c6b8485f04c51b151ec12c6595511d84a2b45a288de2f40024b7f8dd8d912d49f6793a44bc20e615116c383d3fd7cec5ef1d8b7cb7c6d5ead5a4995cf46e8e8551ca15653649192bd5200e5d5e707422006ec93ee2f3cfda3b66acc677bc96a1cdc42908fa50d1a0d4b136ef8c35143473ed37d7"}, @mbim={0xc, 0x24, 0x1b, 0x949, 0xe831, 0x40, 0x7, 0xfffe, 0x4}]}], [{{0x9, 0x5, 0x4, 0x2, 0x8, 0x1f, 0x1, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x40, 0x8001}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x6, 0x401}]}}, {{0x9, 0x5, 0x8, 0x0, 0x20, 0x0, 0x40, 0x1, [@generic={0xd2, 0x1, "9a6de00798129fb670c2f58d4be2b4af6d5811c7a59c5268df23b6463d08abc77efb677d04c7280903647765440b4321aa5257b186c5009c8b1b8a70e2a014e51af08ddd416afe2f04b1034dab055de6b13f76fd63e275dad8e9d67fa63d92411c2bf0409d12e89ed3a67ae342842d2c7db80642546b65a1c738a7e64e534e487662d867fa0b1921140618190893e0e82db2f9f23adeb5ac173f0404514d37a352f20d093469ad92c0f93ef970506d7a5b06ad17275c60cfcae4c42fa148a9c428ac8d4591bba18ac1cbaf61b96f4651"}]}}, {{0x9, 0x5, 0x9, 0x12, 0x3ff, 0x80, 0x40, 0x1, [@generic={0x13, 0x3, "bf0136f67d54667db77c28d146fb053985"}]}}, {{0x9, 0x5, 0x1, 0x10, 0x200, 0xff, 0x0, 0x7b, [@generic={0x32, 0xe, "7731ad2966d185fc5a3ddba161b64927eb29d78b3d525d3f534e1121472f50c68ba5d2e86c60fbb75fd81d1baa052f46"}]}}, {{0x9, 0x5, 0x80, 0x4, 0x10, 0x1, 0x1b, 0x3, [@generic={0x79, 0xb, "dd49141f8b9325173c51f5f277c3dff6fedbbdb265874f77b303c308a014fec642142513afaba71875f27bd2724ba0619b34a5a636c72910fcd471403057b1a16ab9756590d4ded85d207a7c6996d680feed5c849c793f35562a13976839df2bbd4c04649541d8d807767a8421e36068ebf25721aa7fc9"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0x57f9}]}}, {{0x9, 0x5, 0x4, 0x0, 0x8, 0x4, 0x1e, 0x9, [@generic={0x63, 0xa, "7b939d3a8af00b64865f29087b6179d24dbe649f407779b72a3ef4a026f65a9ceed59c5de34b86692de87f024fc86266411694ddfaacdd6b0f46752d71aacb982bc55eac3444a058d452dfc61fd26bc3cfa32f0a390f3e1f41bc11b17835457e35"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x1, 0xe097}]}}, {{0x9, 0x5, 0x2, 0x1, 0x20, 0x3f, 0x40, 0xbd}}, {{0x9, 0x5, 0xa, 0xd, 0x8, 0xc1, 0x8, 0x10, [@generic={0xf6, 0x20, "882118566215da17aeb8df73bfd8bfdba42758dd5848c037d0873d1ad2dc4380e429e09e60788981c9e7aa2668ff9fbf26db9a9bb92c6dbce8b95a74325207bfb65e41ae6f347fa47158a21e2ce2e9dad5e37971dc97bb331d95ade1ab03216b7424ad69bc243d2448e10217ba5d6239cb20d87e2647c9d33943e5499d70f909018f36697bfbe31ec7fa9f216f55c0f1f46f8d7f034592f546f5e01e05c38f35f2f503e79a2e68e3941df72a8cb970daef356fc835894f6aa0ac4f562f86a3f3110f5b973b92bd0b9098bdc1052b59fc335d70935cdaf08793a6b792497581a9b856ca5c77b4fc5af5f25206064bdb933355d54c"}]}}, {{0x9, 0x5, 0x8, 0x10, 0x400, 0xff, 0x2, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x80, 0x6}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0x5, 0x5}]}}, {{0x9, 0x5, 0xc, 0x13, 0x200, 0xa7, 0x1, 0x80, [@generic={0x4c, 0x3, "10624b3b021a934efa9cc3bb2c3d048570d24f9abcb7975cd5994a7909ed94b9ef8344bd553b0f44f11ed43ff5f6adecc595440e57465f1b586c2f9ed36ff6e0a395543fe9905552181c"}, @generic={0x5b, 0x21, "8973181325d2b6ad2d214d7bd8f7a46f84c6dd3bf6b9cc6b4a5e11a4040af095a02606a93912077bf63f18dba8b042ea0b5c98d081f3337856eeb87b3cc7165abf4ef09e2e4f19f3be05755efeb4984d18cbb103dbc6a6aaf2"}]}}, {{0x9, 0x5, 0xb, 0xc, 0x40, 0x0, 0xff, 0x2, [@generic={0xc9, 0x1, "36a1a2299c81ae210f7015258a6af752448f452c700a178b9f1b4f1a7aa73bf105a9d19d35c9dc177cd5d2204db9fb96cb0747e691f1d4b62a49f16801b2ddc8da4af6626a1a320d20775d57e56a7241598ba90eef0a9e1c8bf78b287822135e61dce7dc811ef91fc7014eb1d28d681fe32af1f002498186cc91dc088f933305ec775756a4edb78ce33de7b3fc0f655aa2586ebdb6841fdbb83d638ac976bb156b6a23e74c90b7aac0dad7de14ea96ff378a81450b6cc847f970f926b3091093d7080286258af2"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x9, 0xb4b}]}}, {{0x9, 0x5, 0xd, 0x8, 0x40, 0x7, 0x0, 0x4}}]}}, {{0x9, 0x4, 0xca, 0x0, 0xa, 0x43, 0x46, 0x39, 0xa1, [], [{{0x9, 0x5, 0x1, 0x10, 0x3ff, 0x4, 0x81, 0x3f, [@generic={0x7d, 0x4, "bb95732a2ede19a7cb229ae07e80c777e53712f9ae25ed3a42f9d68214d867483a036ec01fb5c36c3382bebf9d74a273684ce4ae36eff3ef5c2198534f0f1e89527905508b52d7f9bdf6a7990af7bfeb3089e92aafe907813990a1989631165cd5a49650277971eaf2e7544f9f6924b7818038a93c1426541259b8"}, @generic={0xec, 0xa, "5929c05ff79182d67e00d0ce8b00af2b4346e1c7a426c434769843681d94ada6e816f192db77a20fdc57828d52756da0ba2a1f22caf1db7f704c519575a7952b44efc410836ffaa00d381907772e07099d3c4b5d1e0b48cf5569617bc519076164db388250cdea0d8ef14615f201845b3d118823eea9888babb5d05bae48dbeee8c2c9f02a9ad215aa4464de7bb93e34707ddea9eb5d3d156fa16f9141756ee573c18290a7de133199ec4f0316bc3f3a10624952441a55912ed5c2fe0d6abb9074f4625ffd06e7c0b3a26989c5c5447eae212888a1d5d4737c6b2a4478e7c754f072967af956efbaeb89"}]}}, {{0x9, 0x5, 0xd, 0x0, 0x20, 0xad, 0x8, 0x0, [@generic={0xc5, 0x3, "4006427df0b049d7cdb1a25bf42092553536e41126ad90c553a1d3fb5099991e3f6d95809304864cc30a7f9db8d010f929e8d6a6e9cd94bdd3d71a0b31bc009568d710a03a19bb7be5162ef10e2d3e941e8156cae652423f4f901584d6adde6967615d0d439a0eba54a834197e323c624cb6a848c0ecb38ec653804c6a0904d4bd4f7f1e5f5dac1d0eb789f5eeb554792563d7ea3fbc675e0fbed856b8ceed8525905c473c1716bf33a28a71183b02d29422a2c1db0705ec2b855740ad3ab1a8604337"}, @generic={0xfc, 0xe, "455b386eac8d3bd054c46fb5f1fd33a129b0fac003165fd0bdf32c72cec3f0476dcda85e9e960af5170ddbbfa5405069b8dc0f720fb3463a60528b8235bfd0e311ed3732526e18ffff74974954ce8c9dd3e4dd4b423f3db81da1c74527f769fda9a0e7eac098b1578867e75325b6e8c2001df07a4c0e503ce800a1f3c60425f69e7171162a56c7cea2231098bb4bb3a12fa13a718476e6267d8e1bc9da83b7adaa317d95f55bfa3dd5af5277653de2faa9871fed67826f8099243f5cffdf5bc828e1954df398cdd2ef19ff6be436152fb7fcf85291c48381e3330e11d1c08a83f25d1a33c8bda8e12a3249a5080548948cf67378135bb7104c49"}]}}, {{0x9, 0x5, 0xb, 0x0, 0x3ff, 0x20, 0x18, 0x4, [@generic={0xc4, 0x21, "741797966d8286a706afd025c65f1ec70704ac07b8c1e8e84e0f6c9f0a95683e5dd4736c83667213444047123e249f4996a8566be6547bf7bad5d4e714b57f1305859a39cebdd8b9360f0d5cb2ce262a3337471fc7314a7c3d74886fb3011b0578edc4f7b4cd9812812f17e651a520c49a2980388c57319845bf536de8656ded0e964f3390a6bb5af84c2a1fe11d7b56b3fe44ca9bd562f07ad0d9359f3a70bc7fb3799718164f59166a67b8fd30d6fa66fae5e22bb5cba96e0c09d57b50fa64073e"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x58, 0x2, 0x40, 0x8}}, {{0x9, 0x5, 0x9, 0x10, 0x60, 0x3, 0x8, 0x80}}, {{0x9, 0x5, 0xa, 0x17, 0x40, 0x4, 0x4, 0x0, [@generic={0xcc, 0x1, "3ce51da9762a3c802b76be6e9800dfa5be5d3c40944b4f4815f35285be54fc36066713d272d3bb9a1b117603d58761b28afb703197b9579dc1b7f20ac0f3739a76cfe373789a136f46d887790053e52e8b3386ba78e2b82d5b552333bd9ca4f3e426668c42160b5b7e0255cc98d76bfb0c817d994b911da191c7039c93a97856c002573998db840050d2180f8040d73531df9668f165773ca542ddabe3ea32ac9a59344b9d241095fcd5d4d765b334f71407ad95e188cb9befd28d760225fd6f69ce51d1465574fbcaf7"}, @generic={0x68, 0x8, "3cf40d218d6cf0ea4395342f92b8c33605f5d7f491cb2d47bb4f609ba630998835167cff2c682232c7d6b412818bb0a2aab679dc5724df39a25d38d44cedddc38d2359474f02df493dc67344089867a6468b4f01ea59dd7e31af5931c17f9d797b5713bae5f9"}]}}, {{0x9, 0x5, 0x0, 0x10, 0x200, 0x0, 0x4, 0x0, [@generic={0x14, 0x1, "4773ac60d6b0c32e01526b2e775b9b208194"}, @generic={0xd7, 0x8, "5c019ec6eff61910f8533d1ac2599efe0507feb41233e3dc09fc7b5d4f85c2fa651dcc29cc0dc40b730a94d01039ca9b167716fe5c5f5d814bc3eab24ab504dc0ec5d3d03bd14a955faddfb11ca2ea5e47ebea3795b5e7608ae07ce99f397ccac35c2ccd87f2cb7fccb578f4f218d2629167a024a5a9f362697d8d3905c60ff187443b848eed09bc15115c7aa4e3ac0ac8e0697df0dcd1ea8b5a0005cc1c63d58f12f473878a1e596781f0a67c67202e34fde0f276e5b2f4e2e54b31f0b56774758ef83eb1ba6857d76346231b04124d568d7e08e9"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x3441794bf9e0024d, 0x1, 0xdd, 0x3, [@generic={0xc1, 0x1, "ed310a9d16450e7e49675e81fc19ef1cb89ac0d44fabbb77f3186e77a29c7757cb9bf3c36fb17cb03cc0bdf9097505a67e53d8e0efd6e99932413ea4452920f2f396a7914e49f3f1f8f66c9a49bcf9035165722976f461c0605b111ba068133d45a2e12a79fdaebf8cef0eef87cb3e2d3d208d37b5817abe7d1b95753b4dc7ca00b0ac4be0e6578f0f08d3444c088fdca0fcc2b2d8d62ad7a4ee5c1912ea422101d01dbef15b2daf47fa9b6de08016da415359acd14b21905fa0878b8d9fca"}]}}, {{0x9, 0x5, 0x0, 0xc, 0x20, 0xdd, 0x39, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x0, 0x29}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x81, 0x7ff}]}}, {{0x9, 0x5, 0x7, 0x0, 0x200, 0x40, 0x1, 0x8}}]}}, {{0x9, 0x4, 0xc, 0x7, 0xf, 0x22, 0x42, 0x3b, 0x9, [], [{{0x9, 0x5, 0xd, 0x0, 0x400, 0xfe, 0x5, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x7, 0x1}, @generic={0x100, 0xc, "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"}]}}, {{0x9, 0x5, 0x9, 0xc, 0x10, 0x3f, 0x81, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x9, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xff, 0xffff}]}}, {{0x9, 0x5, 0x1, 0x8, 0x8, 0x6e, 0x2, 0x2, [@generic={0x19, 0xa, "f25984c5c6c94507e93108a2db4a6bfa4b38011b078d96"}]}}, {{0x9, 0x5, 0xd, 0x2, 0x400, 0x7, 0x7, 0x6, [@generic={0xb9, 0x9, "95c9b9875c0cd039652073fe54f98d8f160e56c673f7f0dea23b6986d0f50094e7003d8597206d8bbef7e0102626ff5d2cb166c48e4c5793e798fad87062f12380538799ad03f75a24c0b4be3c9631e84bbc63fc6b99a51cc8c6e6eea8d3f3496c1832dbbeddadb19cfb1ae9e55dd2bb934ad9c12cd7224c3d591395bc6e1cf44b545eeb3ced8c20600e4bc5ca879f666e0a7f8f0a394a04117115fd1e5035e866a59e2258f7db59d73ef111119467d058da58d2cc290c"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x10, 0x80, 0x81, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xf9, 0x7}, @generic={0x1a, 0x23, "87231eec1999aa0521c3268658e5d460f4d758896344d17a"}]}}, {{0x9, 0x5, 0xc, 0x8, 0x200, 0x8, 0x81, 0x40, [@generic={0x83, 0x10, "e65da1a00256cf11e7e728fdf5763a6e8a9b6d97c301e0c0d53b24955c4dfd8699b828930f6bfcd8f31dec2c25b5b2726587b4a1fa24a19af8e6611e9bb30fca09dadd9282ba51a53df9b6a1cb39dab88bc57fcf5f22e875af440b6f661a262706e1c9f563e6885431e186dd1f3a31d1991e3892d45c50acd3542e8151d356f282"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0xab, 0x101}]}}, {{0x9, 0x5, 0x2, 0x0, 0x8, 0x3f, 0x1, 0x1, [@generic={0x10, 0xf, "509580f250201c8fd78dba186f12"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x40}]}}, {{0x9, 0x5, 0x80, 0x0, 0x10, 0x1f, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x8, 0x8}, @generic={0xf5, 0x21, "a5a6f2ec3b02c4e4c220062a9aa6f21771576a1ef4402bb8b4f117b70df5c4f9cd758b6fd6471679bc3bc30838d97ea57f9d5f0a21c9db62b383b34d50a1fb4a1d41b231b6641fb6fef8ea407c1a11d76247bbe24d20a7fd93e66dadc0b4e5c04f88a63d126e77b8c56bf694cd05b7deae9c22369b7b2822cabeeb88cd4096556759816544c2b3df60d56c5384e7567b0f8f83c32157db59ee804bd6e47e007285ad8fbb70d6b71ea612a772ee0b63d27edc7c0fbdbda0cb6859f5bf3ee7cf6914efad04e5a1788d473d219662879f743158014bdb39b763e0df883ce105dc4deecb98f7af96043eb1d8b30d95536b0d74a040"}]}}, {{0x9, 0x5, 0x6, 0x10, 0x8, 0x37, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x3f, 0x190}]}}, {{0x9, 0x5, 0x4, 0x10, 0x40, 0x80, 0x2, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x0, 0x4}, @generic={0x8a, 0x24, "07911d72b5034b906d0766e948f52b4b609a5aff9b9d6d77dd5c1c82a6b20250371b1dfd99c4d6da89f563aad31910b9ffbe5efb637e183a8df71804b7b69ef70432082dc7417315a751b8ad7364590d01c19df7b3d758d8e34090279d382ece894f64eb3ef29ebf4b7878e69d8bef5f498a5af146baafc001dc15bb4bf19ee2e49cb71833ec5b58"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x10, 0x9, 0x9, 0x1, [@generic={0x56, 0x7, "6ec7437cc31a24cc3a8e4036d26efe91bc808092e33928dc41858f82a742b632663cf4d60a04a1aee97c15baa7fd692660f21892369837648d2836aad19b3e7db3e201054ff7987d693c65d2752b866826f6034e"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x3ff, 0x80, 0xee, 0x7}}, {{0x9, 0x5, 0x2, 0xc, 0x10, 0x21, 0x2, 0x4}}, {{0x9, 0x5, 0x4, 0x8, 0x10, 0x1, 0x3, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x6, 0x3}, @generic={0x18, 0x2, "894819b90e3b05e571c58d4c0dd0a7901b1386c46c37"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x10, 0x40, 0xa0, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x3, 0xffff}]}}]}}, {{0x9, 0x4, 0xd3, 0x3f, 0x10, 0x8b, 0xdc, 0x11, 0x4, [@cdc_ncm={{0x7, 0x24, 0x6, 0x0, 0x1, "b77b"}, {0x5, 0x24, 0x0, 0x8001}, {0xd, 0x24, 0xf, 0x1, 0x1, 0x0, 0xfffe, 0x3}, {0x6, 0x24, 0x1a, 0x4, 0x4}}, @hid_hid={0x9, 0x21, 0x53, 0x58, 0x1, {0x22, 0xaba}}], [{{0x9, 0x5, 0x6, 0x1, 0x39f, 0x6f, 0xde, 0x3f, [@generic={0x71, 0x7, "23d1ccd95d96deae5d04938492de9bdd7758f4c3ffb45c05eaf7c409b375eb95e829524d92990f4d9aa513cbb11ef120ab8933ecfb089c0d6c23216451e4e33b7facc38c274cbfe4302489b08ce9e21d132b8a7b22d5528554ae33bcd4e53715f7e669beb493fdd81eb7de2db5a555"}]}}, {{0x9, 0x5, 0x9, 0xc, 0x400, 0xf0, 0x6, 0x80, [@generic={0xb4, 0x1, "1192a620d72bd0af294ebb5f9641dbd5410f234c40bf8d56292e10b765afd882933d7637bae096fef6f2a35de9f576f150c73b15ddd2d760fcfc9108e91000e1bdb9f256a4a6005266a9859f135d55d3c09d13cdd06e6526b0571448af39670afcfa055117d7df7f3b707bee31f962851ba743202ee9325af47c3dbc1b19d41bc1012ab83df9e157a8c712fddf9228f6e72bf8bd01bc3fef73a8d83310e5543463fd51ca857c178c228a4f7236e0245b124a"}, @generic={0xd5, 0x0, "b1986e0a15160bb97d820faa9952a23a1203eb5e2825566695202f2bd7a75e5e17fcc7fa7dfd84d781a19348ed4ecc8ea7f8f5c24e09ef52aaaa6e20c0ae7017e6c1d7691ead52b4fa070db58a9e9074c9529851973017e6ea92b44c27ccbe41d196f4ea1be09115c5186d3d33ba9edad4e3b027dd254bc7cea6d1f55458fe4660af6e6fef408c2382038f64c7b8d9a5de0d8b26fc2d30f5a5f9f4660d20e2f3b4ed7477b27f759797963aac2c50efb99230088b0363978d11d3d469041d6d4c1644eba921a7860e9c644a86b85813bfec6ba9"}]}}, {{0x9, 0x5, 0x8, 0x0, 0x20, 0x95, 0x1f, 0xfc, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x1, 0x9}]}}, {{0x9, 0x5, 0xe, 0x1, 0x400, 0x5, 0x1f, 0x9, [@generic={0x59, 0x4, "b71ce9551bf2251a239cb012d30292b023cf4b167191ee2dee00197eac9818a04b81f5ea5b46b7da44e213c1fcc9fd5616e2397901b9ec3dda134f1c5dac70ac7d22ac3abb3c1708fa5a88932709abecd1859e45a8c2f0"}]}}, {{0x9, 0x5, 0xd, 0x10c740804e988a70, 0x20, 0xc1, 0xee, 0x98, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x3f, 0x2}]}}, {{0x9, 0x5, 0x7, 0xc, 0x200, 0x7, 0xfe, 0x2, [@generic={0x6f, 0x23, "b910bb7e7493de3d4db20dd89109f12a5e20f1aab58890b4af085f7cd3e359739375f2aedda659e893a9af08a19fd754da225c44813b60353bc87c49d73f00f549c4ea76c1a9abb0fdb06a7a156e66908580fc2babc0f4df13d08113af26d7638b24bbac35a3967804af14c35b"}, @generic={0xb, 0x3, "4e8170dc0835c53e1d"}]}}, {{0x9, 0x5, 0xf, 0x0, 0x8, 0x71, 0x7f, 0x97, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x9, 0x2}, @generic={0xce, 0xc, "4a761cd06bebd410051d2fb6cc28898078dfa5edbb6eb628e991a7d33c974198501fa1a2365a68ec4aa31acf15f915350b947bfc98cac59386a3b3d19c7d5fe748e17d13ad2891142bbb1bda643c41df3235971d47a470c10e32f2ac013f9f29d41e130d65226807054c479e9a28ff33492c25a5fb39e009f075a57c8372a5bd45a0f06747eda3e2e644d82dc6d08f9713b5362f9443fe15a004e3ebcec53f7a1fd8aa96715f0a9d3ca07bd694febd939cfd25b9b2cbb72c422d07ff9cc3d0ce90f156d01163dd052e45e2be"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x200, 0x7, 0x2, 0x80, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x2, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x0, 0xfff9}]}}, {{0x9, 0x5, 0x1, 0xc, 0x53a6e272e16fedbc, 0x40, 0xfb, 0x6}}, {{0x9, 0x5, 0xd, 0x10, 0x20, 0x5, 0x47, 0x80}}, {{0x9, 0x5, 0xe, 0x3, 0x200, 0x7, 0x2, 0x4, [@generic={0x28, 0x5, "f9e060835a71dbf65cbcf302811595b9da6214c88d6973bdef1b402d8812bc40daa9dfaa091c"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xff, 0xffc7}]}}, {{0x9, 0x5, 0x0, 0x8, 0x200, 0x80, 0x7, 0x2, [@generic={0x46, 0x3, "a03c9a24a8b24e9b514cc31341f7c12b9685ddf756beba128b92a861f20cf565289ae3a339e8ae92bac2a0a1c88babb8e3a6dcee17842738d8c5359ffde580920d4912ff"}, @generic={0xca, 0x21, "2e7bdf9eb2a058b0493c66ddbae02f2453017a2f4e289a7fea30b4855cf639c062167e384bdaf5ec54c17435af760d814aab7687e89e7cb0c7acac89914c89566d4371dca618b6a0343827e1ea9d20e117799146b662c69c8b60bb1423f26860ad2623f7d60866219c9b8296dec25d269a768c08fb974ba14d555eac9252fcf960a3ecdcaae7f9042157bc8cd39b30b9f696987eece8cd5b55e941b95915e8306f55fe13fb1c018a88ec4d2f77b400f50b93e49a20aaaaa25d4cb7eb0d776215146568618245f9e0"}]}}, {{0x9, 0x5, 0xb, 0x0, 0x8, 0x40, 0x5, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x4, 0x2}]}}, {{0x9, 0x5, 0x9, 0x0, 0x40, 0x6d, 0x7f, 0x8, [@generic={0x87, 0x7, "d58caf3f14a6ac61dc02315140b6301eabf4ea064afd3dd7655659e06396d4d76f43ed195d4bf0e27c71f014d411a0c99dfc0046b6f30af5fe2eaca71ef4a4ed556a5f36633350b8ff9531c8b1197c10cc3c84fa090e3d69a48704e346cfba0ab0e9b6e5534caae9be680062fbdbb92b4212a0e93f012e00a6165b9756869caf957a937123"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x93, 0x94}]}}, {{0x9, 0x5, 0x1, 0x10, 0x8, 0x1, 0x0, 0x5}}, {{0x9, 0x5, 0x80, 0x1, 0x8, 0x5d, 0x3, 0x4}}]}}]}}]}}, &(0x7f0000001b00)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x201, 0x40, 0x3, 0x20, 0x20, 0x4}, 0xec, &(0x7f00000019c0)={0x5, 0xf, 0xec, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x2, "41900416eadfe4fa78d0bf747f95be2d"}, @generic={0xd0, 0x10, 0xa, "5c09766d286eab6a9503e1e8a2385e06c43771cb77dfe4689363a5476a1385d8d5d411a86bd965b15cea38eac6e64d0e0fb6d02e53023355e83255f8497818f646c78bfb952d6d3bea26998615aceb8c284281b05511c5e619e5a1da4f82784123bd90adf424b8dad48bae20e9e4c3c1706030df8da2216acd47ed3595ed7f4f6aff7a45d33e0791fcfb57b1db631ea798507b95f51d313dd86c42a72b453016bee3cf274000efb5b543809a5756d79aa85fa8355e9a8b8d919d6c5adb9176b07f19d7903f06dc5bb661b22dac"}, @ptm_cap={0x3}]}, 0x1, [{0x37, &(0x7f0000001ac0)=@string={0x37, 0x3, "18cc0c97ca53d0c6596ed6e747d61b7a14e23738f6c749588f018a4f1c88cc319d9169cfa4569481fa69ffd7c0d7ad01b8e1d476cd"}}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000001d80)={'veth1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000001c40)={0x14, &(0x7f0000001b40)={0x20, 0x21, 0x7d, {0x7d, 0xe, "d2aba4930b177efe5fdcb1045f1c40b6252d70625f43aa60c1e77f80111239ed6a3c069d7e2cbbaabb349d00702c4e88aed9ad0feccdb50a7915f2795e1d67978a9be9bd8c55c63e82f60c05cfdc17134e816d771d2e7827efe357580893d420e0e99bfe3fd13c9db4da97b15fd371cff218dcbc39591be8312b27"}}, &(0x7f0000001c00)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001d40)={0x1c, &(0x7f0000001c80)={0x40, 0x10, 0x18, "7e351e603e7e839d3f82cbcdc5535e63986472b5c74acca9"}, &(0x7f0000001cc0)={0x0, 0xa, 0x1, 0x62}, &(0x7f0000001d00)={0x0, 0x8, 0x1, 0x7}}) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030220081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030230081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030240081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030250081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030260081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1798.806840][ T7562] loop5: p1 p3[EZD] p4 [ 1798.811236][ T7562] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1798.832133][ T7562] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1798.892253][ T7577] print_req_error: 23 callbacks suppressed [ 1798.892276][ T7577] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1798.903743][ T7562] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1798.912091][ T7590] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1798.919031][ T7589] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1798.929270][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1798.951773][ T89] buffer_io_error: 11 callbacks suppressed [ 1798.951782][ T89] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1798.966134][ T89] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1798.977106][ T89] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 1798.985160][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1798.996486][ T89] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1799.004909][T19597] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 1799.016563][ T7592] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1799.017008][ T7590] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1799.029234][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1799.042766][ T7589] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1799.051812][ T89] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1799.071126][ T89] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 1799.079278][ T89] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1799.093170][ T115] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 1799.099819][ T7589] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1799.111758][ T89] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1799.245044][T19597] usb 5-1: Invalid ep0 maxpacket: 512 [ 1799.395029][T19597] usb 5-1: new high-speed USB device number 17 using dummy_hcd 14:49:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x14da00, 0x0) write$P9_RRENAME(r3, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000080)) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030270081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x3c00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0xd00}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2d00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030280081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1799.630308][ T7605] loop5: p1 p3[EZD] p4 [ 1799.637298][ T7605] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1799.645602][T19597] usb 5-1: Invalid ep0 maxpacket: 512 [ 1799.651464][T19597] usb usb5-port1: attempt power cycle [ 1799.652605][ T7605] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1800.365070][T19597] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 1800.455181][T19597] usb 5-1: Invalid ep0 maxpacket: 512 [ 1800.605073][T19597] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 1800.705137][T19597] usb 5-1: Invalid ep0 maxpacket: 512 [ 1800.710579][T19597] usb usb5-port1: unable to enumerate USB device 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4001, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030290081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x4000, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0xe80}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x60030480) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair(0x3, 0x800, 0x6, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) fchdir(r0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) waitid(0x1, r2, &(0x7f0000000200), 0x2, &(0x7f0000000140)) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302b0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302c0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302d0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302e0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302f0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x2, 'ipvlan1\x00', {0x100}, 0x7fff}) getsockopt$sock_buf(r2, 0x1, 0x3d, &(0x7f00000000c0)=""/210, &(0x7f00000001c0)=0xd2) 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4002, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030300081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1801.935523][ T7631] loop5: p1 p3[EZD] p4 [ 1801.942161][ T7631] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1801.972691][ T7631] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x5800, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x1100}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v1={0x2, '7U'}, 0x3, 0x7076fd471e0fd61e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r5) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x17, 0x9, 0x3, 0x75d98079, 0x2, r2, 0x5, [], r3, r7, 0x1, 0x0, 0x4}, 0x40) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030330081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x3, 0xfa5d, r2, &(0x7f0000000180)="f5502c02d56129ea3aff270402d80e362a364109da3da5d0c60620ff9c8c3b928f85ac333bcd8b5935bdb5f8ed3ed477c45c4464929c547a82aa7ec49330901d444af27e2ad1fa6618b1e0ff504372cf60c8d9d404bd1bee24f9ef42c59791820bd3bdc697b88955bba4211b4940e6422c979fa446d37f44a0352c", 0x7b, 0x1, 0x0, 0x2}]) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="40000000140021010000000000000000020000", @ANYRES32=r6, @ANYBLOB="1400020000000000000000000200ffffac1414001400080000020000000000000000ffffac1414aa3610a34fbee3ab48a5cba61ef5e7b8728930ec7a6c6effc3bc140426249926e0fae9e507568955be41e56a0c8f91d8e7ead808e965c99dcfd2748b143d328fe8bee837ad0f48a5631364b3e1f551994368b2e59f250de2c9ff275af3714323e062bead442d6c592477c32ba08d5974c15d9d4d042ec7c11efb531fcd1d8d332b72259384a6e8940c634e2e662f1c495da2a067f195a344f4c583aa85fd5dc808f9ee95cba53de0c388b70c1a4a993ecc44e59f15a4021865c0f0242391051819af"], 0x40}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="78000000290000012dbd7000fbdbdf2500000000", @ANYRES32=r6, @ANYBLOB="f3ff0300020000000d00ffff080001007366710006000500008100000c000100696e677265737300080001007166710024000200080002000100000008000200cb000000f2ff01000000000008000200292300000c000100736b627072696f00"], 0x78}, 0x1, 0x0, 0x0, 0x4804}, 0x80) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r5, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x14011) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r5, 0xa, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x894}, 0x8010) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r5, 0x800, 0x70bd25, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40044) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r7, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030380081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200303c0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200303d0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200303e0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030410081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1802.227650][ T7665] loop5: p1 p3[EZD] p4 [ 1802.239928][ T7665] loop5: p1 size 11290111 extends beyond EOD, truncated 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4003, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000004a00)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x2, 0x3, 0x1, 0x3}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="8d9138", 0x3}, {&(0x7f0000000140)="99ebaaae232bb605afc0efdfe609546b9e79ee35148e9d88aeff25e12111700effb566b7baeafd4c337e0efc11ec9222f034b11f92c42323b2ceaa65b3be896927e1f1e81536c46c099021c541267c7337cb20150703449ff1f83182ec9e268e44f3c5a602461ec30e8b8058fb499ea0b08542634f9275b73d06181386cae189fdf276e732050adf950615a9299b6e75c8fb4cfcfc8e69b790196915afdc6b8e0e89b68d5075fed11977a1e8e8c5e17b3327ac5cad75c37fe163eed1e47576828fe935efa9115474ed68da61d6ee79d686ceb6f187118e4c5bd98d41ef201802c978724da250572369ec2661b63bc5", 0xef}], 0x2}}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="00e29de5a7da5fbd8f4ed292403f55e09a7325d468e7", 0x16}, {&(0x7f00000012c0)="e61204011ba538c99e24ade2892314493f5c8e5a1a19350dd0ca59c863b2e8ffed592530f5f30ed4561c8160f7fe92d34236fad3294b3f222618df07cbe03bf051b3f8fe2dbc1d3b1c6972ffebcc301008c1eff4c692d8a9eb03874acd73312877eec2794dc275fb36a2c51a01573f743e880c53823a955f6118225b0c51653d7b37d816a1c27500f59d79bbdc933111910cb68fbb9b973ed94b64ed7124b606bb96b679d5cccaf6a8ca6d2a9988d9923d2e36c81a64fd85e59c91a899c01a3692b8734f0a010f7a5293164d7f1051cc5aed1555", 0xd4}], 0x3, &(0x7f0000001400)=[{0x100, 0x104, 0x20, "5d3dad70fcc6be22fc26224eefe89c0a370da0fa940dbbb42ce0e7fd170cb04545da15a66f4ff69b350e5b00c26992d66213c5ef825b36af6d79bd9238f35bd55557db6a3b9c45e9cf993e8988860c196f90dd385444f3a49f59e861d9a5d2cce324fa6c10e4044f9231f1eb1dfbba30f45418cf06bc9839e2d2a02a4df0e46ad5b3627cbc8938c30bb4e30fff735effa516f20c177b2171d814f50ed6eb8becbc0e9691d0e594b8408b43e4e3e338e05d452c83fb9287a3866a6a0af9243468dc40ac3f42da84fd5bf0af0c3c0aa15a703006a97aa511ef5da6be4be2242bed9ff529cdbe8b72728db502e7e166ce44"}, {0x28, 0x102, 0xa0000000, "30ba331d71947283451ce79eb56d1f1d1304"}, {0x48, 0x104, 0x2, "6a7e3d4a02d01e71edb62146c8b5c9a58cc92551e692075ad37157f55f2949f9c6f841536d669f43c4883e10b202af09881618"}, {0xb8, 0x19a, 0x8799, "dd1bf1299b7fff1677b0ac37130c390495df35b96c373623c6d12fffbb4b998ce16d2b697bc306e6e969aa7e3e84eee9704c86e30026be9ce2fd58998ff59824c76234fd8269d7a6c8500ce65e16074eb9b8e9c59b8421c6343696db370d1a63679f6404878f539a7a12bb13292e6e19552b4562cecacf22d8842bcd1aa733a601e01d6b2bf1b4e532896b317f6fd98b892fd7aecd7edf1a3f63193fe4e5506de87e309c7fd37f"}], 0x228}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000001640)="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", 0x1000}, {&(0x7f0000002640)="128377027e0afb60e0", 0x9}, {&(0x7f0000002680)="5ac06375b0e9a6d2bfcc9250ece1063176e5035aec63e54afafe8539c8bcf62ae1128b5f856742704883d5259c82940a626f80871881", 0x36}], 0x3, &(0x7f0000002700)=[{0x48, 0x104, 0x1, "e4cc0c72a02251c21b40c5151757cadf522added393d3ac5f01e8fe3b6d3205632b498e80e30e7e6e69acd0416cbc486c236"}, {0x1010, 0x6, 0x7fff, "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"}], 0x1058}}, {{&(0x7f0000003780)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x80, &(0x7f0000003a80)=[{&(0x7f0000003800)="7158374d306e64a745b7ef4c0a1393be40e3d7119f77df56c1e8f6b015854999a175be6cdfce692d8869d0622bc801aac04c1e561e10b16446f8eec50f3a8511204dd64488bfaee4c86e8a891265fee67022e9e5af103bdfe0533a59b68ea81f388261831cc37cf49e9eee9fa7a32e7beec97f02b4465d8bc661375ad715fcccdf1ec669e16488bedb04ef9a47984261f33fbe2bfcb7e9ed82bd738abba6e929b125f4e5bba6ec8e25bd6fe8b14fc51402d68d7dce280403d0a883a36ee0fef09d29a09fa49d406603e88e4f7f8080799d", 0xd1}, {&(0x7f0000003900)="cc852d77257caa920c5a4599c2cb1f7ae0c573453286efca4f74ef0558bce45763aa6b0f2f58f4c8b6731c106fd11523ec57c6e2d59f70ce5d06f0a00751b99f8f4f1ebbefd85faba21f835423cbce20785285e74b369db3900633d7fc690a9d8d347eb7b4f62d0a0ce9e6e7c13ed655a3612c4c5336c7de357d92042cd04f89", 0x80}, {&(0x7f0000003980)="a99547356283246a0233e11fb28c282d955242befbcd6a39fe55ca270f6b6bd79e2a05cc2412da3c667b5af6a22cc4391200e1b02fa85d41058273d0a62e0ccdcc8c134c5b9557839e2c242b4988937de27fc79bae09775267358ea09f32865f603c19913362d74e85cce8fe6d4d8e8c65fbb9c4a490ff7289f36f97f1a7a6e5c06407b40a1756f4eabf8992fb373c77161c0acbf67ac7c424b75f8c7aceb27b8222589a68b3784e76107682d47c971fdb7e898efc7637391201b36d38bee65b0852155a564f4ddf3223ca4b620e8c9a12c8480178cb268b22d482232b6586b4b56e50", 0xe3}], 0x3, &(0x7f0000003ac0)=[{0xa0, 0x10e, 0x400, "4357a004dcd716f42b9453822873780c34d13025a84f035d641d7ff89aa728608594407616e3aae50af3be296b7eee7d49f3d3801703db73133606ded4995f07fb67f7ec1384fcb29ab015b2de29800befa6c06a2d6f625359b85866ddf0963a169d5ec0943df4c11609da5ac3735e35ba21513db1978aea9611bd63ae7afefe2ab839d790523c4f4b"}, {0xb0, 0x0, 0xaa, "ba8dcb51a8b9d978552f64c0c554a1fca259b7e72a7eb58eb3212afad38f95879d63f0754aab444720ba40a03f92404bb7788c504c9df350fd809af083022cfddd7428d73ba25212d5fe4d5ef1e064d9d6d0c67c2df54a18e73b03bf8e73db0ed311bf4dedf3fd03f1d9cbe73c5d1a2330993ef7ff98189d949063a52d7e0b0e1420ec47e8094f80ab480b48187c032e36154956541603acce165696"}, {0xc8, 0x119, 0x1, "2a6b11af53c9241bfc83dab4ee00447eb0c33b5c8b4e56340574e1d2fb453b89ef5476df2a7cb6d3cddb3efc319c32a2e2ee58498786dd707920822a9671d5e0c895028758c5a0f3b5eebc77b0ec5411a67c283a4ca403cb4fca1313f6ce9745ee1777edbd1a337862bcf9fb934ec57960078423fcf0d411af375326f8e40b55c73d213003aac26e3e9ffeefca2604ea4b76cd801a7dbad1c5a32306fe58384b0a40de89e695a948a7bcfc4ffe1b46d294fab8"}, {0xd0, 0x118, 0x9, "8606bff182555f521fca5a6a55d5973676ad7a6ecbb66c5cee3fd6c6ce9b7e0f4f6d816c9435b36be22ebc7a82464e33eefa56420e6607515d5d72d2537c16476d20a078123969281edf0339fc5ceb1b3e8999de90f2c564c119f8d7a6bc78f6a2c07e67d518b0311591add50951b9e9ef71cfdc717ce95737b18803f2848d008f004f21db890072e70b72b0ef3666d57b7bc89ef1018076d60f93c73605c05223ff8a188451c29a53a06bc33bde9710a968485aa1f6a06ec809"}, {0x18, 0x118, 0x6, "716f70cb911ab9"}, {0x90, 0x84, 0x101, "519579b5bd15a8ae25487e19a8730a9c3475434da423febeebf8dcaec7bee4614ac8a1a7d5204be92a1c7b840608a28dd5e8b2e504bc4ea4a47f5a26af60e107b8c60d8022f1c18e86f70c9c8180227d4727cf5cec61d16a15cfa4efe45ab957f76e256f914d68180db466423ec24ca923429375636bb8604d3c28b7"}, {0xe0, 0x105, 0xff, "6abdada01f341b083ffb6ff53ad91cfb667b565e939cbce92a3d00d1f9c15088ba873270b4b4b73907cee355a504fcf0f1df9674a83ca80fe9a16d4a2ea634afa0554a9af20c17a1eaf4c097a2b04e53e1dd10f088a5e0a40ed9dd4b32579cd180211c259bd6b676c91b0590888a6c2a0f6bfb97a68092f29b6103ef9ac3ab31a9595b2f2c1ad27cf30182cec66392d1e971ed82e5f73e1db02b43db93933a75aba81310262a7ade5ddd1666203527d00d260d4f96b63ff5b4cecdbe3accf970d5a8291c95edffe0f683ed116b6e688f"}, {0x58, 0x118, 0x2, "8008a8f7a1b0f3fb654e388c17b5a7f68a6c41254821d3cd66cce82a3e7c74dec8993554ee0ec0a05bf311fc10e7a44593e684a052533cc6acec77e502b6864f4add77a76d"}, {0x48, 0x1, 0x9, "5d2cfb273ccfb78f0be590e38707334f4f3b04f61e16355919fe7677e23905fb05e0f7e30d36267505176393cab2d31ae1968116098666"}, {0x60, 0x10e, 0x8001, "1b0fc918bad858cead9ec83b04c9aa06dfaa65f52a8253070a576fc85870dc7eb838b4adb21f306ac3f350d73d45258259dee8e39384c58deea8321cb5c0d4ab23ee34311519701cea5ef66447bbc3"}], 0x570}}, {{&(0x7f0000004040)=@rc, 0x80, &(0x7f0000004280)=[{&(0x7f00000040c0)="ce88c8d369eefa0563e18e00556950767038aa26141d8dd88dbb1d3a77e357bbc893252ba6b58da9cfaa2d0c1ced627d489d5f8c8d0f723e4f526cd58ab8136526c3cd5583f8938d1ac60a53f304c9aeb2c5b6d8462fd94b49622d6d996349de56ac363e4912832153c142dfd46616705dccbd499054dc6bf54d24522f302b75e3c59e70af7f64", 0x87}, {&(0x7f0000004180)="903089ef4821340f127e80dda0e423a63798aed2f2cf8ad7d15a3205ece25a70863e5a47d96f5ec9c2106b9883a0ed490d8364d8d009e81f500bdc9a57d4c1f6fc44b2665969c6bb0b25ece85502fdba2276da953bccfddcc732a731c9c1a3754e33ce4d41f5930c0703bfbfb552323e0cf2a1d5bf7f4d4b4c49511c0b78415f039553f7c26c8abe228b7f9a985460930da8d2d25c52f83fff0eb9e507ffc50fa01478949482fea327b8661b6135bcdfd05787fb4a3f94afbd95b45d1d984b9fe82214806ce232e5fd9a4ff4cd3bb7365b", 0xd1}], 0x2, &(0x7f00000042c0)=[{0x90, 0x116, 0x1, "c010cf7490dfe88f5e5e542ee0fa057f86a1f9cef7890e0dfbc90ee391b128aad1c2354e91aca40a3e7cfaf35fbd3f05cd75e28d4070948db51b93b3d0d41a67900f1d1d9a65594119674e79c884b4be40df8b955d5d7f379b59f1fee022278e867e2c948b97281f45ec156e2111f471d3376ddf7eb8625e49bd"}, {0x100, 0x109, 0x0, "29aeaf1d627ff3d1b90e36dcb44513ace200ab39bee22717ccd87a8eab01ecaabbddda892a532bf6ae46478dcc48695a041c50334809765b3f2c4db885cb5601f9aa0fa2777a98ddf69d788bc553fd4847954a5557a9c615ed97307aa6d8ca2f4deb4205035394b091c0a2e4f56060ed491f073a6afbb966884af9311c4537b162a34a6b8545ea4541cfaeca35dd4b4758e89ab022838afae36da3d429b4ad16bc590756aa5b559bf303ef77fc3e97bf06a411cbcd0bd27eebf24a59cbd8c9d691091e46536bf3d9e2aa1f63c9be7cb780e344afee4fa5988b4ca5087f83be5ffb74cedc0359a28153bd8d1d"}, {0xd8, 0x10d, 0xffffffff, "ed868376426368f6cec6d9966d5c3c20f6fcf7810051f9fcbf1b7d3af434da25d6a5f0914d3b836ef3bb70090280f393af507968d7b88450838be7c2a87a5f0791061b0884c98c1bc15e8617ef542f6344942e4a72a742319735760d7f3ead400fc05e1c001486cc96898add615fad86d5a3e963b9b2cb6b050d6b90514f9ce5cc9c39e343f9f5b4e50c8b92f98c863801219f5ac429ee0984bff542aa8553a32a48cf73dad6f2c4dcec6b9953493cf11545a35fb4f90b351107989c0668f009f9109c3b"}, {0xe0, 0x103, 0x2, "a52272b92d029027d01baa8c56b909849034af2024e07499320d976972a20e427e869290cb2ca97852b6e90981c9a5123d34337c675fe012f9620769c14a88dfd7bd812d8b51ec24f1a96762548fb2000f0df5106487911e6e9361185d96a143ada2a98a643170d8d0e1cb73f20c62f47fd3b5d7dfffe6034c0fe7abab2caebde981198677ee40f1a80bd423bcd0d58e6d8b76a2ef48abc0946bdf4752d98c720f664e459d136114c068cc41c248bf8977795e4f319564a55d8649df9695e37c464b2c142a062cac53fad1"}, {0x40, 0x10f, 0x305, "e8b494616cbd42624a41a3d494c7d71f3a592641c3431a5f298846c04a387e285920540d9cef9b1881ca9b"}, {0x108, 0x114, 0x9, "3f6a322e6d6cea4947c7d932bff4f7dcfff4cad2035deb5abdbfe08af632199526983c62f33565f4e0578f0e0ff0602c24faae303722f3639d77d2000719348e565b5ec3afcc865729b5fb82b385a9a7faa5daf2b715742e460ed5ef76a6c84ce647db39ee4f92e3b42f38cc569a4ff6650576d29042f5bbaab75f11c6f4b690110c82d7079cfdb952a9e877d1aeba2a2c11af64886d24f099a4bc54875d81460d6698e60c3fd7ea4ee483b4243c4ac5c9b31c26cad8b7094de9f6e01230a13e104383d751471daed0b9c81558574d2e29ccd32c5b939a4ccc674cc21d2aa2e1ab6b82710ba0bfd4a94da3b5c3e403a222"}, {0x30, 0xf, 0x361b, "037f378a902cb7b657daa67ec5a234500cc6af7336d15df1b437a1615398"}, {0xf0, 0x118, 0x3ed665b6, "628952a7979519edeb8ca015a88d67941503a740d45d0a48fd2312738e5de55afb7dd17cddce177ef9d1a50f0a3fb32c8bda8912dcf5e8c7781c6d58e948d78e65ce6dc9b97b3c5c06e521d6d763f408a339a94ef7a2d5cea41a677a873f3f70e8c9030493ede9de44534fda253d6c2a3c1ea474ecf5b60e08381e6de5f4238aba094170707048c21ec64f271748adb94886d1fea9d79e0d99f8dd8cbd5c50fcf9c49c5ec8365da079c49c39142722bd96574acf4adc460d60d32c0970042e53bbd2d1b6a8b320e86ab670f6852dc32c996aff83fe070e1f5b8a330dfc22"}, {0xf8, 0x29, 0x4, "de8afdedf62b7717668c07832930ecca9f1e86f25321f4e4c49dd998ef68989c4feadde3b8250e873e8c129967e1ce981644adf422447c02ad96cd433465f8821aa8ef5a21809d4f8d2aea3d662716df572c909906e73fa7f65ddee7fd36b3a7a803129f727e6f6fcbc7c2a32fad5b94eb15f512370488efb7d371cc425b3f4ca0a42180af16959aceac79cf8aea179fd9c707d583cd3812052ed6bae81a3bc4e4f7afc43531db6b65f3f89003542577fbea1ce9770daeb3301b1714f36582556caabfd2424e6e5c7ed0cb395b82890789f0964af43e54336dfadfb8f33a75ebc9b55a89"}, {0x80, 0x108, 0x80000000, "1edaad414bf67748c034d73b0754f7153b9c63ae3b320b5d0a28f416f7da65adf4e2553b255543eb93e79a1e76fc5416613cb09434cd5f6735a87957c311e64004adc1e75b48ff2872598543e1dfd28244aa3ad98030078392b5d1c36cf089afd25e4634c7ff62f2c17af704"}], 0x728}}], 0x5, 0x4) [ 1802.271766][ T7665] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1802.290565][ T157] loop5: p1 p3[EZD] p4 [ 1802.294908][ T157] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1802.304229][ T157] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x800e, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030420081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x2100}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030430081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1802.565636][ T7705] loop5: p1 p3[EZD] p4 [ 1802.571566][ T7705] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1802.580303][ T7705] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x200) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r4, 0x0) clone(0x70825000, 0x0, 0x0, 0x0, 0x0) 14:49:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f00000001c0)={0x45, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r5) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r1, r4, 0x0, r5}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000200)=0x80000001, 0x4) inotify_init() r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000040)='./control\x00', 0xa4000dda) fsetxattr$security_evm(r6, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x7, "ac85b7d26aa3c83d2bf024b29491"}, 0x10, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x9, &(0x7f0000000000), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030440081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4800, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x3a00}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030450081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030460081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030470081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030480081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030490081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304a0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1803.167778][ T7737] loop5: p1 p3[EZD] p4 [ 1803.179655][ T7737] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1803.192500][ T7737] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304b0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000001c0)=""/4096) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x800, 0x7, 0x4, 0x8, 0x2, r1}) fsopen(&(0x7f0000000000)='pstore\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000001240)={{0x0, @broadcast, 0x4e20, 0x1, 'wlc\x00', 0x0, 0x7, 0x7a}, {@empty, 0x4e21, 0x1, 0xb9d4, 0x3, 0x200}}, 0x44) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x9, &(0x7f00000012c0)="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"/289) 14:49:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4d00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x4000}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:32 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304c0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304d0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304e0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x9bb}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./control\x00', 0xa4000dda) r3 = signalfd4(r2, &(0x7f0000000140)={[0x4]}, 0x8, 0x800) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES16=r4], 0x34}, 0x1, 0x0, 0x0, 0x4044052}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd8, r4, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x65}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9074}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x98a1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffeffff}]}, @TIPC_NLA_BEARER={0x38, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4000840}, 0x4801) r5 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000000)={0x2, 0x55, &(0x7f00000000c0)="6c145939e1968b9976988c86b92f44d4249c7f770c0bfcb6f7047af322786253c4bf8cf7176ca48c98b5c61627ab8a6fdecb7c25311a61971dd0aab82e4ec5fd9bf3cb358e689ea26e8e7a2f27ac1bdc9b13901978"}) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200304f0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030500081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030510081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x4, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x80000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0xcb, 0x4f, 0xffff, 0x22, @rand_addr=' \x01\x00', @remote, 0x0, 0x8, 0x10001}}) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000001600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000015c0)={&(0x7f0000001640)=ANY=[@ANYBLOB="f01100005e456fc9", @ANYRES16=r2, @ANYBLOB="020027bd7000ffdbdf254b00000006009800010000000400ec0008000300", @ANYRES32=r6, @ANYBLOB="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"], 0x11f0}, 0x1, 0x0, 0x0, 0x8000}, 0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000140)='net/rt_acct\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r7) ioctl$TCSETA(r7, 0x5406, &(0x7f0000000100)={0x7, 0x1, 0x6, 0xd43, 0xc, "ecbe1033c2b3e43a"}) write$cgroup_type(r7, &(0x7f0000000000)='threaded\x00', 0x9) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030520081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1803.828952][ T7784] loop5: p1 p3[EZD] p4 [ 1803.838582][ T7784] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1803.862618][ T7784] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4f00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x5800}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x4, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030530081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 4: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0xfffffffc, 0x0, &(0x7f0000000080), 0x10010, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./file1\x00', 0x17) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1000, 0x7ff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./bus\x00', 0x400, 0x3, &(0x7f0000000500)=[{&(0x7f0000000400)="e54b20ce3764e8b4981ef08e3886c56716079c5c85926ea4f6afa43f32fd6cfbbe4365eb38f47fa52136009129a997333b1d7cfd121380c0ee5069d0599ed569ef04d0257e886ec0452f6d114c26e4e4a80d18cda355c305f51d9eed6b7d4fb23e5747b24925deed71c253b638af74251d01a541aaf04641970d0a1aebbec3929f51f01f1a6d95bfafb6f79f537cc70c2a8ab238cd4ef441f3fe560b96287c922f5b82ba558b2572f260f57f34b00a26c212f5ab30bf71640788fa78702c10c3b1b657a07bbd347e4d64e79f1b677770d13f86", 0xd3, 0x4}, {&(0x7f00000006c0)="3afc01db350e8f14735385152e26d3345bf9f0e0478df5289ff8acf38827afcc8fc1ed40d21830d5ba03e00826ff4bdc65eb6545b575afb6e02d6c00777566729385be191f468a6fa702ab8429150eb235f2c0db43297f608564b8ed8d1f952651727193a849b3d8a4323f96d001aa230ea730a2c13835775f724bc80052b169ddf9151503bb512ef9160859a6d0a7c7457a541b20887af4a196dc712589a2abea83c8798ba5ed4fb378ca44c9ba87a27c7100541556b2afa13af76c34230ae5a5d37a4e2c9119247c763cad5b5088e76730be7a0df81fa9074cc2a896584a82e189849ae856beb691314c5b6be0cf424e159a97c2e686ef0ddcf9a830c59cca62e54bb0e1cafbfb6bb11d803f298a2b1e95b4fc61fdb3a748843f228c2a0e9b3b55d313046b915144da430938f8f1917a152cf4ca9f660605494f10434434b49a326fe42e1892eb105b0fd1af4dc9184769399551beee1ac3771f058fb48c6c765fe2d1598cc41f6ad7ca128cbb043faa3aa955a141008a92d58dd57216bc0ab64cb81d76a683564597d6347c9971a1f71680db7c1ac2ed8b7fa877fd9d804b077877c017deccdfdfda8b5c1646bfa33d132c60adc6c3694dc58b4a05b70bf172d610d5be045b82d41fc2652c7a5378f7f1f95e33d59e31f11fcbffb2506e26d5d2ad0d2c4c4f675c5172a096081a9e381a38f8c0055864f83b22939d03edda5c39d45e2a6138760f27498f68df7b9369b56113bc0c54ae3438ff12c13327e136b5bd318e915836629e0f65947f8a041a6f06dd3ac77d86fd759ab56d3f80ec0aeb413db87c56bea78007838f91a91b54b69ae6540058195f43c1a98b87c3031548456ea4e1d3616d498d4e2c63e8e8666740295e4eb5641716ca52393c889300977a7b6dd216bb8d72deb4d4bef321f51b926e93255d6483b2984ea9e30c0427b62f9f2107896af03603d18c0c4fb53ec754bbe9963f514398c7197cac6c1015aea7d4a9619f679b8c5c5b4cb0db1998a378d10df47bbbf51fe8c3b7dde430720d06fc1a85049747fa7971d05917b3a129eece96a640f1fd39c2972a39b405210093c49ead550bdcc380eb4e25a56a4c5c8eeab5dc10dab106947eb273c52167e4048ea4d630d12471e55a624a1a8e11f52fcb29ae3a60822446a6bedf016c8d9e0aef34f97e0eb84ad005953d82cf02a58203243e6c639ba12937492c5c0b01a0677bb150fcc3ca7cc301d216b2e199ca45a66b57881be6ad6b1a783afe233e397a4595efa0f93e5b20024b2bcd03a92d8c451bd4d81c04dd8321f809738e5464ffc08725116dc09283489b73fc546d604c815e0f224de2103c92851978c5142198ad47aeb5a9290daa54d580eb164bbf044915a9ec323c2962cf7108ba916651c1ee78914ac152cc53645d287fdb47f2e88316dc728f16f071770e50a51e2c19ea05ac628620cb8996d8dde9dcf1194e60418b6216a3d1680e86a3591618405c324dee115fe5fa736cc0f905ebbc1260423764420722f1ef7098abd071f061bf035c17791597b1f4c5dcaed87e3986c697caf58c5d774adbdd6e088317de08d603ad655db57b8be5309217c5bfc5c063b3238706fe31fcca8e8534f9f7e99657fbd438c48deabaf5120099033e19934416b40c12769e6ed9108e42cb17d7eeeb6b44c271927f9d0c6013b3a125c744ee4b54c1df3e70b0813b0fcf5e76129db3cff06231718f966f5e68f66e02de2d554bf7fcfc12cdc0f360e4905d14ecaec63b711b2c647aa51bdd378d652ab0adf8c05414d5f5cd73eb1afd486a2da7927792098ba04763c519c2fe835d05e4e680d4d49becb4cab993a3128549faf1a0c12209a32bc9b2302ec35a367e73afbbb92d40416acd5404e236239edd365eca195d5cbc68d94f1c6b6041f1c384121a4f8e9a03586a13d1738cef1563de9f3a1a8b36774b973a3acbc62c93aeed633b96c1b98a763766821f63e205dce627aac5f157fab8d822a2e225f1d04f8809dfc522258272240f0f009cd0df9a6fccb89e344aad8b202fe83fdfa6cbc49a197c71ef90832ed52e20c643aa3f0fad2667ab69fca5bda309ed74830e25824010dce25a3b47eb4d573d028ad7a3f4924018a79ae0e79cf65128e0f6ab0f5e61be193b0c5646f4486957283dd54000f37e15adb947792543b560f733b57045be9a08def9f119aded297402ac4817fc231a057e2d1c825196ddd864e77893716045b1a40a38b38f5d06db92fd3563f110da017ca8a6d18b2b20205747934c1eb97e50b29d73392ff7f0408ee26f9197e2b02c05543bfc8979369d674c69d8f255f8ed9a5c17988eee69a348516a86aac62ec06ee3afcbea5b31daeee05de8f199f987ecfc559901dac912137bd0c24140eac9e2223a9e980ad604d4dd4ba95dd4f6934f6829d60b026b0ac6aee729e3a3a3ef801f55ed38a9611350595a6fffd56d891bcff103a3eea0d37bfab7071c6cd668d8b692ffd4d5074d500323dae20e25852e5ca6f25d3a652a396f387726354fa98580cec8d974e575b83cf07766c8386c60017a27b895f4379b070314e7575c4ed7ce5b228b3d8499d36aa2b619db506f50762918951e56d1384978d5a75d0f0cec16266418090221b8c98b9a8da2bdd3c1d1bc7cc7599f0b3b558ffe79c54bf5e3bc28138193bd0a028c66cd977bc83100d9f027b15333c9407ad2b3d3e4f6b910a4ff4262401e9766a388e9f95981e8eeae251a983f5f1311127f3a1f4f6312e449b9be7351f73573546d9347545a39577c259309abdb4a90c3f3ae88fd0f111e86e0746e463c36d1f241961747df3ab03aaacb249f2c8077335f3756267f327b72c9a9dbc69083f96dca0690264b9c8bfd390524e4e408ea21e3be4aaec6c3ba790931138d23a409df3afd123fb2c1991503fc9d0794acb9627b00248c30e3d65da638cac28268baa92c8554f8333fa812164770e37b8723aa0d97485af3f80a305dc60fe64737c7e458d63766774a18435c1aad82612b5f8e0a8b8e0bb86b8c094be1bf7db9973ff1c6d4bc14cd29eed5d6d601ab07bfb64aa362f0b280475e1c5c41bd8e2c97b1b80d431418959ac448588ea0681bb0949b067af9d45afe909480b146b85fb75aa55e9df39da015af5883e9b564928518e2e60476f7805f8e9279af0d40494396fa9ce50380ebaa6d351e6e63d7e985873b78eb5c46074d1d6005942756791b61d41b50d04fad6c2fd10ccb83a4d8a4fec92f0b477aef2ebfc59cd10ffbe9b9e535cb41934142162ce34f15337e97e952f1091ea0b52f33e1ee023ca6fe1ae50514d27ad692154bb3c7614a266b96fe6371b149f22b600bf63a12eb1d7831cb8a4784f0a56ee02254b023ba01741180a6ff5b7f0c870ffccae60b368e93f719674f067054c678196c07300377b3b4559e4205ad2c1962a5f84af761148644db2a5901bd3e4122d1bd8835f160145f64e0298eb5a0232482b1ebad7198a38ad47a1f36931db7a71ccf4c10470ae6c49b0deaa3d7623e9384d1d86b047d726e94127eaf7e803e2880397fb92a03410a89bd68ae6fc9f939fc4e6c7880af816f4f2810247245de2ef5fc437b9ed387698b2de00e3ba0336192b6e98f801d7bda4cf86b5d765fa1b446aae459a67deb45797cd8e3533ea252609c0c58be5c70b468dc948721657fefe06e8bba27dcd37f9119644b29a056c591be7d703c11b7ee8f6c2d78426f3dc8eb09303f37d002801bec6d05cf9e6c329a9b5ee2364824191a60e1fd6dbfbf48a911cde3a83d233fb17ce3502bfd85a94f76133ffbc6fa1c6fffcbc85aa55f580ab80f9168458f0d688538f14a18313a2c021a4e44d8a74b27493900c51b176d3dc50e065af3f9cee96385abc49fd52233251a2ed0c5c47d038cd3bf60ec30688259a7ae6daf853225dfb6e1a0300185879d95c077b92fd8bc42caabc2885e94fe44a7fb18e9ca3203eb2f8a1e469fddbe8a7cf4c156333fc4308b7e01d8414811ea39d344e4af00f22edf6fd36edf0143d8249367e6c62edb7418bde7d32a4cbf96bb7bbb9645f53ca45480e3676dcd0d417320e17d56eee06635b51c784dc2f562ca49f4e1ea5bec589c39bfbd5e6c87b1a6024f33b9bb6550b7ae9810e1825f7deb7416b5df0d6c0c6aff9d23eef22997140a89a6580945c64f5d27be13d15d17d75e65665cf980e1b114ba86066b4f45cbfaaee0765a97af0a2896b8f8548fdd25d54fb9e928f227a5b80c4c2b133824d04495eeeb13363969f5008a18ee8f3b561ea6837a1a1c459180eb794ed561cc5109c2f3f4605c7fe1731fe253d2420fd387208b1994b9e6d0804ce6ace046e9f21893bb749fad2321c2a7d6edbcac0b9bc4ffa71bce4caed363e1406cc61ae9563e50b753441370dd5def1197603ac2924e96a8f150eb44228886e10d269b2b0e3c2a3d05951e4dc9c7c5c29663c950bc12f368e7e11bc17470564fdae079dff14b676fbb365457b612996172a4166c0b4c7f3a7833373d340aed3a62411f6cd6aad0866a48e900938b651d12cf60b5513ce65d26e922aa1178fd7d84a48fda88146f1d54ec66ad5af383f84ef1757f8402cab060924705b4d9c602eb92efedbf5c1d73d20389d4241378cb95d42506077982b82e9c8f198a94f285346764a37a51e5a1a0e91ae70eec264bd2598d705eba4f52005ce594702b8c511c80d45d5e185fc8d740ddf3e6969c6353eaa654ef4d0b8d8a5e0232cfe5627cf921e1c73a6b89c4251e5a1f6d335011a9ee20c298c3eed5e97824c9527e8ef1971efed0830908c681ad92b6f0e510e5750b6b42262625f56f08814dd8e80d659f55ed45457e6927a7ab11a74076489898ebcab2b2362f1670ad6433c789817963b57d3b007233466854a750fb1bde178622d8dae79140157ca7ed3e8177f3d2eb1f10d4d532ba3c4b074f57602df14b4079065a247cf55979414402e71ab1e264d6a21b81d335836cc5e2feb34ceaa7854a10db62d612fc813f10f3d4c23666bebf6c39109120dac27362df77b1530557917e3c01dfb7419b20cacbfcc9722db6219f586b0d9ac5ac980cefbc06e484a5ab5dfa32aed148f1c96783acf3e2c7778c0e7799843bf7a0c1986c28d0707a6a885c37e6e0ef03df4264eca058ac9fe60aba72cc5ab7e23545f8053d7260e1c3da2ed157a394225a3a9362373ccbbdc6bcf55d5bbae29a951d2ca20f7fbefb214c60890a442584f6f35ae40b21b6b45fb2d521f103ed825b831e4291b79b18d99e780f8a971b24975498cad982fcec3e214de61612ce45ab9af4b60546398a36b46fcde7c99ba11d66c9c4c7b67dcb2bb959f7a58becb08fcd98fb15807b23877b43ad68010eaeb7a3031709a1874de9a4b6e685325c7c456b40a37e39e048361f75bd75f6ee46c3e41e7457752fd7aae66c065070fd0c2d01ce25bf7fc1c11e2ca1245b35befb58f39dc0c98309cf1795991d564f22a44c7a9e8b9624be789c9c9215f01b3d699330db22011b56a4e1cf2cd689cb8190edf92a72d8c7a37ff9747b192c1bacb73f1bd96830c9c37c6198378de9b66c6b62372e79f8d39f1fa76c11e4aa67476cf8974ffc8872fcb71d02139bf493094ba35113c7175b325fa37f756de4dfd8d6fb7f4d70c01fa83337d76efb19925d9cd1290b89afe96772f7a964740d3c083e4d2ce7cc9f13abd8df24fab44b50f1424d2e0e093a104f15b7f66c0b2dd5a25d5ef401608596f9ded904b743209b4877025ef4ff33e7b80d6fc17f9e78c548d82332a9c11a720ccb6847", 0x1000, 0x1}, {&(0x7f0000000300)="133c7ea248c07051b041908346ca764d7203b53f71622697c14722f891b92ac13bf2510db32b8e1a2771fbf3694ca3e35c6d724ecd8b7d3808d5a2a610f5ffddf60f52d45420ad35600c2db641", 0x4d, 0xfc}], 0x0, &(0x7f0000001980)=ANY=[@ANYBLOB='dots,dots,umask=00000000000000000000007,time_offset=0xfffffffffffffd12,fmask=00000000000000000000006,dmask=00000000000000000100000,subj_user=%:{,subj_type=,dont_measure,fsuuid=1e975fe\x00-7d5:-bc14-763f-04a06afe,uid=', @ANYRESDEC=r3, @ANYBLOB="b95f0000d35650fe2b5437f7b1c054e7abeb4e2ed4371a874f08fe8d70bed052060142a84444d78a08d624d7b7e9a2cba09431b5d24089e071e5bca72ce829b885602b05ce1f7fa32012158b350100000000000000544e0000008000080000000000006c7d41cfc3c485e2eba270d6b2d200ec05c792c84b03da33fd58fbf3c4f1130500d185d75f145f0416c0029af8cb0a4b49e70d68ec6e59fb7a561e6c0c434d1d6fbca525ae2dc1759e2723bc4e5b9ac36f821b3a6bd78af1c67e4341ab7f89b23946dd48c73a33af88593bcf2349a087b9e1bb959ed5418118bb67ec2138981166a830f2d36399463a06d47906768dfd3c768b285490238d857f6474962fe528bc156760e9a239bc530c38a41b2b84b4000000000000000000000000000000006a35be522d5efed4c86f1df472dfb0efe97517e0606cdc231a07914e528f6e82ad867939c8577234aa6346838894227ce1cc31ad31fdc7f1ff368bdac4af8d96102a53a35bbb4e3a4a73d8f79b4cc8acad200f0a81b90a902ea1f0ad3b968e933d4ccb9504b3fc0cf71e5193ea39ec21a547293bebbabfed5176766a50"]) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r0, 0x4) lseek(r0, 0x0, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000004600)=""/200, 0x0, 0xc8, 0x8}, 0x20) open(&(0x7f00000000c0)='./bus\x00', 0xc0602, 0x5) r6 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r6, 0x1000) lseek(r6, 0x0, 0x2) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x8400fffffffa) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030540081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030550081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1803.998700][ T7817] FAT-fs (loop4): bogus number of reserved sectors [ 1804.020521][ T7817] FAT-fs (loop4): Can't find a valid FAT filesystem 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030560081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030570081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1804.112648][ T7825] FAT-fs (loop4): Unrecognized mount option "subj_user=%:{" or missing value 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030580081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1804.213367][ T7814] loop5: p1 p3[EZD] p4 [ 1804.213424][ T7817] FAT-fs (loop4): Unrecognized mount option "./bus" or missing value [ 1804.224997][ T7814] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1804.239785][ T7814] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200305c0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6c00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200305e0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2, 0x800e}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1804.335293][ T7843] FAT-fs (loop4): Unrecognized mount option "subj_user=%:{" or missing value 14:49:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20400, 0x0) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030e00081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:33 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030e0ff81ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070281ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xd, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x806, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1804.615197][ T7858] loop5: p1 p3[EZD] p4 [ 1804.620734][ T7858] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1804.641679][ T7858] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070381ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x7e00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000100)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x4, r3}, {0x2, 0x0, r5}, {0x2, 0x3, r7}], {0x4, 0x2}, [{0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x5}, {0x20, 0x6}}, 0x4c, 0x3) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070481ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070581ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x10000000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x4, {0x1f}}, 0x18) fchdir(r1) write$binfmt_elf64(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x5d9) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070681ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070781ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4001, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x14, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070881ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1805.075541][ T7893] loop5: p1 p3[EZD] p4 [ 1805.081174][ T7893] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1805.090821][ T7893] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1805.136154][ T7908] loop4: p1 p3[EZD] p4 [ 1805.150699][ T7908] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1805.178493][ T7908] loop4: p4 size 3657465856 extends beyond EOD, truncated 14:49:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x4305, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070981ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8002, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x1c, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:34 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200302e0081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070a81ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070b81ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070c81ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070d81ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1805.395804][ T7935] loop4: p1 p3[EZD] p4 [ 1805.400923][ T7935] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1805.420173][ T7935] loop4: p3 size 1912633223 extends beyond EOD, truncated 14:49:34 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070e81ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1805.454952][ T7935] loop4: p4 size 3657465856 extends beyond EOD, truncated 14:49:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2f00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030071081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x29, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1805.640840][ T7943] loop5: p1 p3[EZD] p4 [ 1805.650610][ T7943] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1805.674993][ T7943] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8003, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030071181ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2f00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030071281ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030071c81ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8035, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030072681ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200300700810f00ff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2b, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a0000008777007200300700810fffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ff0f0000000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ff0fff00000000008000da55aa", 0x40, 0x1c0}]) [ 1806.089101][ T7976] loop5: p1 p3[EZD] p4 [ 1806.093601][ T7976] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1806.110751][ T7976] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1806.191050][ T7976] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1806.191267][ T8000] print_req_error: 8 callbacks suppressed [ 1806.191279][ T8000] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1806.201620][ T7999] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1806.217892][ T115] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:49:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8100, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1806.238285][ T115] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 1806.259389][ T8004] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:49:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffff0f00000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8100, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2c, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1806.305238][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1806.316596][ T115] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1806.331090][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1806.343024][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff02000000008000da55aa", 0x40, 0x1c0}]) [ 1806.362848][ T8000] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1806.384547][ T8004] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1806.399044][ T7999] blk_update_request: I/O error, dev loop5, sector 18 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1806.415863][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1806.427202][ T115] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1806.455225][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1806.465545][ T115] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 1806.482064][ T89] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1806.489762][ T8004] Buffer I/O error on dev loop5p3, logical block 1, async page read 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff03000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff04000000008000da55aa", 0x40, 0x1c0}]) 14:49:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2f, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1806.517908][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff05000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff06000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1806.690636][ T8012] loop5: p1 p3[EZD] p4 [ 1806.695241][ T8012] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1806.726092][ T8012] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff07000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8200, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x3c, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8847, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff08000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff09000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0a000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0b000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0c000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0d000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0e000000008000da55aa", 0x40, 0x1c0}]) [ 1807.160507][ T8053] loop5: p1 p3[EZD] p4 [ 1807.173080][ T8053] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1807.189778][ T8053] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8300, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x58, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff10000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8848, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff11000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff12000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r2, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r6, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r8, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1d0, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xc12a}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x44}, 0xc000) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r9, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff1c000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff26000000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff04020000008000da55aa", 0x40, 0x1c0}]) 14:49:36 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00030000008000da55aa", 0x40, 0x1c0}]) [ 1807.511137][ T8102] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. [ 1807.528509][ T8102] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8800, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1807.578477][ T8090] loop5: p1 p3[EZD] p4 [ 1807.597958][ T8090] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1807.608671][ T8090] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x600, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff02040000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8864, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff06040000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff80040000008000da55aa", 0x40, 0x1c0}]) [ 1807.869560][ T8121] loop5: p1 p3[EZD] p4 [ 1807.874207][ T8121] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1807.882959][ T8121] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1808.311470][ T8146] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00050000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8900, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x3, 0x1, 0x1, "da547568abec6000313c1ab3d5590fb8ea820019690e10e41f9304"}, 0x2b) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xd00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff2d050000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00060000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff04060000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00070000008000da55aa", 0x40, 0x1c0}]) 14:49:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:37 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00090000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000a0000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000b0000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8a00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000c0000008000da55aa", 0x40, 0x1c0}]) [ 1808.646178][ T8158] loop5: p1 p3[EZD] p4 [ 1808.651536][ T8158] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1808.670657][ T8158] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1808.885628][ T8189] loop5: p1 p3[EZD] p4 [ 1808.890018][ T8189] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1808.898350][ T8189] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xe80, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x23101e80, 0x0, 0x0, 0x0, 0x0) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000d0000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8b00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000e0000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff08100000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00110000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00120000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff001c0000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x1400, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00260000008000da55aa", 0x40, 0x1c0}]) 14:49:38 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff052d0000008000da55aa", 0x40, 0x1c0}]) [ 1809.531692][ T8203] loop5: p1 p3[EZD] p4 [ 1809.550821][ T8203] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1809.586385][ T8203] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8c00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff003f0000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00400000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff04800000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x2, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffffdef0000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x1c00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffffeffd0000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000800008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8d00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff40000800008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x3a}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'gretap0\x00', {0x2, 0x4e24, @multicast2}}) sendmsg$FOU_CMD_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r2, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x20000004) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff7ffff000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1810.008926][ T8258] loop5: p1 p3[EZD] p4 [ 1810.019151][ T8258] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1810.037750][ T8258] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x6, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000001008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2900, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1810.090941][ T8298] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000002008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000402008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8e00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:39 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000003008000da55aa", 0x40, 0x1c0}]) [ 1810.325563][ T8312] loop5: p1 p3[EZD] p4 [ 1810.329972][ T8312] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1810.338435][ T8312] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1810.545596][ T8343] loop5: p1 p3[EZD] p4 [ 1810.549907][ T8343] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1810.558395][ T8343] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1810.878950][ T8352] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:49:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = gettid() r3 = syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/pid\x00') setns(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r6, 0x4c03, &(0x7f0000000040)) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0xd, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2b00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x8f00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000005008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000006008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000406008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000007008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000008008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) ioctl$HIDIOCGCOLLECTIONINDEX(r2, 0x40184810, &(0x7f0000000000)={0x3, 0xffffffff, 0x8, 0xff, 0x7, 0x8a}) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x100) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x163bb7480, 0x0, 0x0, 0x0, 0x0) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001008008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000009008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1811.146670][ T8366] loop5: p1 p3[EZD] p4 [ 1811.151437][ T8366] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1811.160985][ T8366] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x11, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2c00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000a008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9200, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000b008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000c008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x70, 0x5, 0x0, 0x1, 0x7, 0x0, 0x5, 0x22c0d, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4dceb84b, 0x4, @perf_bp={&(0x7f0000000280), 0x6}, 0xa4, 0x8, 0x4800, 0x3, 0xf9, 0x5, 0x1}, 0xffffffffffffffff, 0x7, r2, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000000)=0x7, 0x4) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000040)={0x359, {0x9, 0x1, 0x6, 0x80000000, 0x7, 0x9}}) unshare(0x200) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r5) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x1) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000240)=0x80) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000d008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000e008000da55aa", 0x40, 0x1c0}]) 14:49:40 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000010008000da55aa", 0x40, 0x1c0}]) [ 1811.546379][ T8407] loop5: p1 p3[EZD] p4 [ 1811.551259][ T8407] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1811.560723][ T8407] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x21, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000011008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9300, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2f00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000012008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000001c008000da55aa", 0x40, 0x1c0}]) [ 1811.865670][ T8447] loop5: p1 p3[EZD] p4 [ 1811.870486][ T8447] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1811.879171][ T8447] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x5, 0x800, 0x7) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000026008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9400, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x3a, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x3c00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000052d008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000003f008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000040008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00080040008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00f0ff7f008000da55aa", 0x40, 0x1c0}]) 14:49:41 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000480008000da55aa", 0x40, 0x1c0}]) [ 1812.487140][ T8475] loop5: p1 p3[EZD] p4 [ 1812.491605][ T8475] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1812.504327][ T8475] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffffffffdef008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9500, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2010080) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000000)=0xd, 0x4) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r8}, 0x8) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffffffffff6008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffffffffffe008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffffeffdffff008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffff6ffffff008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_uring_setup(0x6705, &(0x7f0000000000)={0x0, 0x611d, 0x0, 0x1, 0x324, 0x0, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r6, 0x0) r7 = getegid() setregid(r6, r7) unshare(0x200) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r8, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081fffffffeffffff008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x5800, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00020000008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9800, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1813.345899][ T8526] loop5: p1 p3[EZD] p4 [ 1813.351421][ T8526] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1813.369112][ T8526] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00030000008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00040000008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:42 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00050000008000da55aa", 0x40, 0x1c0}]) 14:49:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1813.696893][ T8579] loop5: p1 p3[EZD] p4 [ 1813.701273][ T8579] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1813.710507][ T8579] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) preadv2(r1, &(0x7f0000000000), 0x0, 0x0, 0xffffffff, 0x2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00060000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9900, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x800e, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x6, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00070000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00080000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00090000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000a0000008000da55aa", 0x40, 0x1c0}]) 14:49:43 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000b0000008000da55aa", 0x40, 0x1c0}]) [ 1814.339034][ T8611] loop5: p1 p3[EZD] p4 [ 1814.343569][ T8611] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1814.357479][ T8611] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r1, 0x14, 0x1, 0x1, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) 14:49:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xd, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000c0000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9a00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000d0000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000e0000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00100000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00110000008000da55aa", 0x40, 0x1c0}]) 14:49:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:44 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00120000008000da55aa", 0x40, 0x1c0}]) [ 1815.129528][ T8648] loop5: p1 p3[EZD] p4 [ 1815.138030][ T8648] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1815.146423][ T8648] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = signalfd(r0, &(0x7f0000000000)={[0x3]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200000007fff) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x72805800, 0x0, 0x0, 0x0, 0x0) 14:49:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x11, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff001c0000008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x9b00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x2, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00260000008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) getsockopt$inet6_int(r2, 0x29, 0x3e, &(0x7f0000000000), &(0x7f0000000040)=0x4) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x8, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0xaa}]}, 0x1c}}, 0x1) setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r6 = gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x40) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) capset(&(0x7f0000000080)={0x19980330, r6}, &(0x7f00000000c0)={0x200, 0x0, 0x1, 0x2, 0x184, 0xa8}) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00040200008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000300008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair(0x2b, 0x6, 0x8000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r3, 0x7ff) fchdir(r2) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00020400008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x21, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00060400008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sco\x00') fchdir(r1) ioctl$TIOCCBRK(r1, 0x5428) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x12010680) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000080)) setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaa00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x4, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1815.937915][ T8685] loop5: p1 p3[EZD] p4 [ 1815.943720][ T8685] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1815.966872][ T8685] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00800400008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000500008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff002d0500008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000600008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000180)="f5ec897a773e0dc642cbe4f7714acf8edbfe112557a3c1eb3ee07c4a1738937abd1d5ec8ce1a70f5c992511433b63be54f8e6240d29d894f19b727f94f96066769f5352e2f39d163fda542b68be7b14cc94548c3a1c2ca01b4207459e5", 0x5d}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1816.287783][ T8729] loop5: p1 p3[EZD] p4 [ 1816.292551][ T8729] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1816.304279][ T8729] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x3a, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00040600008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x6, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc000, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macsec0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r8, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x10000, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x5}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0xd, 0x5, 0x89a}, &(0x7f0000000100)=0x81, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x8}}, 0x10) unshare(0x200) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r9, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x10, 0x7b2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000700008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000900008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000a00008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000b00008000da55aa", 0x40, 0x1c0}]) 14:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x58, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000c00008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0xd, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc001, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000d00008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000e00008000da55aa", 0x40, 0x1c0}]) [ 1816.708701][ T8770] loop5: p1 p3[EZD] p4 [ 1816.713346][ T8770] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1816.731370][ T8770] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00081000008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001100008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001200008000da55aa", 0x40, 0x1c0}]) [ 1817.001553][ T8813] loop5: p1 p3[EZD] p4 [ 1817.006080][ T8813] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1817.015015][ T8813] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg(r5, &(0x7f0000000000), 0x0, 0x4) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r6 = syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x14, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001c00008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x600, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc002, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00002600008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@empty, @empty}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00052d00008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00003f00008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00004000008000da55aa", 0x40, 0x1c0}]) 14:49:46 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:49:46 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00048000008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00fdef00008000da55aa", 0x40, 0x1c0}]) [ 1817.607695][ T8844] loop5: p1 p3[EZD] p4 [ 1817.617838][ T8844] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1817.630380][ T8844] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00effd00008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xc003, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xd00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x1c, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0xd, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1817.939852][ T8887] loop5: p1 p3[EZD] p4 [ 1817.947034][ T8887] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1817.955005][ T8887] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000008008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0xe80, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x29, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xca00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7c1000) unshare(0x200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/uts\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00400008008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff007ffff0008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000018000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r6, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000028000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004028000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x1100, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x2b, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xcb00, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000038000da55aa", 0x40, 0x1c0}]) 14:49:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) signalfd(r4, &(0x7f0000000000)={[0x27]}, 0x8) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000048000da55aa", 0x40, 0x1c0}]) [ 1818.517905][ T8908] loop5: p1 p3[EZD] p4 [ 1818.522332][ T8908] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1818.547065][ T8908] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000058000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000480008000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x2100, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000068000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004068000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000078000da55aa", 0x40, 0x1c0}]) [ 1818.708044][ T8960] loop4: p1 p3[EZD] p4 [ 1818.719452][ T8960] loop4: p1 size 11290111 extends beyond EOD, truncated 14:49:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2b00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x2c, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1818.757970][ T8960] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1818.768807][ T8960] loop4: p4 start 2147745792 is beyond EOD, truncated [ 1818.896618][ T8959] loop5: p1 p3[EZD] p4 [ 1818.902177][ T8959] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1818.916923][ T8959] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1818.941034][ T157] loop5: p1 p3[EZD] p4 14:49:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xea26, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000088000da55aa", 0x40, 0x1c0}]) [ 1818.947303][ T157] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1818.956711][ T157] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1819.165711][ T8989] loop5: p1 p3[EZD] p4 [ 1819.170273][ T8989] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1819.179587][ T8989] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000010088000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2900, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x3a00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x2f, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xf703, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/time\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r4) ioctl$TIOCL_UNBLANKSCREEN(r4, 0x541c, &(0x7f0000000040)) fchdir(r3) r5 = signalfd(r3, &(0x7f0000000000)={[0x1]}, 0x8) setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000098000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000a8000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000b8000da55aa", 0x40, 0x1c0}]) 14:49:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000004c0)=@v2={0x2, @adiantum, 0x10, [], "c97e5ab531583c82ab85bfd61e29bd7e"}) r4 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000540)=0x8) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000c40)={0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="000005"], 0x0}, 0x0) syz_usb_control_io$cdc_ncm(r4, &(0x7f0000000040)={0x14, &(0x7f0000000180)={0x20, 0xf, 0xcb, {0xcb, 0x23, "9cbb01d0b9c7dcb5dfa60d48e8a99fcf63dd44c399837674ed789de57ab1c31428afc3ca0ef4af8850c4a7ddc7a40822831c929f8634ad10cb065c15294cba052c80ae6a6fc87128cab84a0454f0b81de49dac52ac83c4d82ad9551a10af9ebcbbbcf80d5ecc1f0dba50b75e395ac595c4a98f96f10f14ddabf24e4f6e10f343136e94fd4f464e628d81c4af49a1799ce9b58f47c5d8b9ab5d398008ef1b3858204aaceb57ba7d7b22a40d4df30f4e0c61b435d53f3f91885f96a0a2c898edf50bb5889afa50eab44d"}}, &(0x7f0000000000)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000440)={0x44, &(0x7f00000000c0)={0x40, 0x16, 0x68, "17ff9edb7b4ff38d266c79912450df4b2060d8bd014ab7406559dc65c75961f2e38870273720667b51bf4c2b3f142fc2405dd74cc5e34fe799a828306d1c2fc9095b6577231a8a27711ee0b3d3d55109db1523675a4da90017cc35a39822237af724f50ee254a3fb"}, &(0x7f0000000280)={0x0, 0xa, 0x1, 0x6}, &(0x7f00000002c0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000300)={0x20, 0x80, 0x1c, {0x3, 0x3, 0x7, 0x4, 0x5, 0xca4a, 0x1f, 0x7, 0xffc0, 0xfff, 0x9, 0x40}}, &(0x7f0000000340)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000380)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000003c0)={0x20, 0x87, 0x2}, &(0x7f0000000400)={0x20, 0x89, 0x2, 0x1}}) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:48 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000c8000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000d8000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000e8000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff7ffff000008000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x4000, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x3c, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1819.677553][ T9003] loop5: p1 p3[EZD] p4 [ 1819.687756][ T9003] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1819.714050][ T9003] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfa03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000108000da55aa", 0x40, 0x1c0}]) 14:49:49 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000118000da55aa", 0x40, 0x1c0}]) [ 1819.756068][ T9038] loop4: p1 p3[EZD] p4 [ 1819.760667][ T9038] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1819.768667][ T9038] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1819.776857][ T9038] loop4: p4 start 15794047 is beyond EOD, truncated 14:49:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x5800, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:49 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000128000da55aa", 0x40, 0x1c0}]) [ 1820.087786][ T9051] loop5: p1 p3[EZD] p4 [ 1820.092960][ T9051] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1820.102649][ T9051] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:51 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000001c8000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000800008000da55aa", 0x40, 0x1c0}]) 14:49:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x58, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x800e, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfb03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000268000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000052d8000da55aa", 0x40, 0x1c0}]) [ 1822.625781][ T9071] loop4: p1 p3[EZD] p4 [ 1822.630494][ T9071] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1822.658089][ T9071] loop4: p3 size 1912633223 extends beyond EOD, truncated 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000003f8000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000004c0)=@v2={0x2, @adiantum, 0x10, [], "c97e5ab531583c82ab85bfd61e29bd7e"}) r4 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000540)=0x8) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000c40)={0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="000005"], 0x0}, 0x0) syz_usb_control_io$cdc_ncm(r4, &(0x7f0000000040)={0x14, &(0x7f0000000180)={0x20, 0xf, 0xcb, {0xcb, 0x23, "9cbb01d0b9c7dcb5dfa60d48e8a99fcf63dd44c399837674ed789de57ab1c31428afc3ca0ef4af8850c4a7ddc7a40822831c929f8634ad10cb065c15294cba052c80ae6a6fc87128cab84a0454f0b81de49dac52ac83c4d82ad9551a10af9ebcbbbcf80d5ecc1f0dba50b75e395ac595c4a98f96f10f14ddabf24e4f6e10f343136e94fd4f464e628d81c4af49a1799ce9b58f47c5d8b9ab5d398008ef1b3858204aaceb57ba7d7b22a40d4df30f4e0c61b435d53f3f91885f96a0a2c898edf50bb5889afa50eab44d"}}, &(0x7f0000000000)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000440)={0x44, &(0x7f00000000c0)={0x40, 0x16, 0x68, "17ff9edb7b4ff38d266c79912450df4b2060d8bd014ab7406559dc65c75961f2e38870273720667b51bf4c2b3f142fc2405dd74cc5e34fe799a828306d1c2fc9095b6577231a8a27711ee0b3d3d55109db1523675a4da90017cc35a39822237af724f50ee254a3fb"}, &(0x7f0000000280)={0x0, 0xa, 0x1, 0x6}, &(0x7f00000002c0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000300)={0x20, 0x80, 0x1c, {0x3, 0x3, 0x7, 0x4, 0x5, 0xca4a, 0x1f, 0x7, 0xffc0, 0xfff, 0x9, 0x40}}, &(0x7f0000000340)={0x20, 0x85, 0x4, 0x2}, &(0x7f0000000380)={0x20, 0x83, 0x2, 0x1}, &(0x7f00000003c0)={0x20, 0x87, 0x2}, &(0x7f0000000400)={0x20, 0x89, 0x2, 0x1}}) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000408000da55aa", 0x40, 0x1c0}]) [ 1822.676405][ T9071] loop4: p4 start 524288 is beyond EOD, truncated 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000800408000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000f0ff7f8000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004808000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00fffffdef8000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfc03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00fffffff68000da55aa", 0x40, 0x1c0}]) [ 1822.986864][ T9077] loop5: p1 p3[EZD] p4 [ 1822.991529][ T9077] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1823.008560][ T9077] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:52 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00fffffffe8000da55aa", 0x40, 0x1c0}]) [ 1823.505944][ T9123] loop5: p1 p3[EZD] p4 [ 1823.510391][ T9123] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1823.518840][ T9123] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:55 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000003f8000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r4, @ANYBLOB="02002dbd7000ffdbdf2507000000088a4018bb00000008000600feffffff7be5dcaaba4cb08c"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000004) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000011c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001180)={&(0x7f0000000100)={0x34, r4, 0x4599a54fc43e9a97, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x35}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x88000}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NLBL_MGMT_C_REMOVEDEF(r3, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x1c, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24002804}, 0x20000010) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c) getsockopt$inet6_buf(r7, 0x29, 0xd3, &(0x7f0000000180)=""/4096, &(0x7f0000000080)=0x1000) unshare(0x10000a00) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r8, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00effdffff8000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfd03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00f6ffffff8000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00feffffff8000da55aa", 0x40, 0x1c0}]) [ 1825.786004][ T9150] loop4: p1 p3[EZD] p4 [ 1825.790846][ T9150] loop4: p1 size 11290111 extends beyond EOD, truncated 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000200008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000b01fe8000000000000000000000000000aa20010000000000000000000000000000ff010000000000000000000000000001fc01000000000000000000000000000100"/88], 0x48) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r4, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000300008000da55aa", 0x40, 0x1c0}]) [ 1825.838579][ T9150] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1825.878639][ T9150] loop4: p4 size 3657465919 extends beyond EOD, truncated 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000400008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x6558, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000500008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000600008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2b, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xd, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1825.991150][ T9148] loop5: p1 p3[EZD] p4 [ 1825.996252][ T9148] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1826.013681][ T9148] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000700008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xfe03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000800008000da55aa", 0x40, 0x1c0}]) 14:49:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1826.330882][ T9192] loop5: p1 p3[EZD] p4 [ 1826.335298][ T9192] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1826.343500][ T9192] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2c, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000900008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x11, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:56 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000b0000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0xff03, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x4a0e03) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r6) ioctl$USBDEVFS_GETDRIVER(r6, 0x41045508, &(0x7f0000000180)={0x8001, "46027e02acdca9299947f67e399bd0ac31a4dc7789345a6d41557d84d64c076bb82c56062ddcd1f64f5ec3c950b0438a3f42e7292df18c988ce293cadccf21b8b95271027cb8ddce667c09fe78743d07a154d18a3d545570472ed897e859338fa306fb710b22e2e81014d6f286af7247ca3b474b35b71a9d8af68c8e57d23c00e410b4b6835f8a288c138275300229e28b311c316f1b8b70a2d299d45ce59b4dcef4709eda336399b7b76f9bb9aed5e0de81b88757ca97bb7c0d25266798aaf2a05172518ee5d77641f4f49fc7d68046ee5ca0842b6a8a67c0eccc6eca3b6c532607e6e91d53bfcc3275570a27f7614eb51d2300"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x1, &(0x7f00000000c0)={0x35, 0x3, 0x1f}) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000a00008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000b00008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000c00008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000d00008000da55aa", 0x40, 0x1c0}]) [ 1826.755843][ T9220] loop4: p1 p3[EZD] p4 [ 1826.760494][ T9220] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1826.785280][ T9220] loop4: p3 size 1912633223 extends beyond EOD, truncated 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000e00008000da55aa", 0x40, 0x1c0}]) [ 1826.803709][ T9220] loop4: p4 size 3657465856 extends beyond EOD, truncated 14:49:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x84, @empty, 0x4e23, 0x2, 'wlc\x00', 0x0, 0x2, 0x62}, 0x2c) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x1c00, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x21, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="030181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001100008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001200008000da55aa", 0x40, 0x1c0}]) [ 1826.969267][ T9217] loop5: p1 p3[EZD] p4 [ 1826.973698][ T9217] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1826.991753][ T9217] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00001c00008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00002600008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000402008000da55aa", 0x40, 0x1c0}]) 14:49:56 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000003008000da55aa", 0x40, 0x1c0}]) [ 1827.166726][ T9266] loop5: p1 p3[EZD] p4 [ 1827.171458][ T9266] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1827.179666][ T9266] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1827.191662][ T9266] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000000)={'virt_wifi0\x00', {0x2, 0x4e24, @private=0xa010100}}) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000204008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="040181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x190, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x100}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x146}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x7fff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffff6}, {0x6, 0x11, 0x6b}}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x3a, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x3c, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000604008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00008004008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000005008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00002d05008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000006008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x190, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x100}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x146}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x7fff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffff6}, {0x6, 0x11, 0x6b}}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1827.777993][ T9295] loop5: p1 p3[EZD] p4 [ 1827.785830][ T9295] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1827.794102][ T9295] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1827.803793][ T9295] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1827.899190][ T9303] print_req_error: 8 callbacks suppressed [ 1827.899203][ T9303] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1827.919626][ T9318] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1827.920294][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1827.931625][ T9295] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1827.943615][ T89] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1827.951949][ T9319] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1827.970524][ T115] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1827.985655][ T115] Buffer I/O error on dev loop5p3, logical block 131968, async page read [ 1827.994132][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1828.005652][ T115] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1828.014021][ T115] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1828.025584][ T115] Buffer I/O error on dev loop5p3, logical block 131969, async page read [ 1828.034033][ T115] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1828.045407][ T115] Buffer I/O error on dev loop5p3, logical block 131970, async page read [ 1828.053841][ T115] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1828.065146][ T115] Buffer I/O error on dev loop5p3, logical block 131971, async page read [ 1828.081351][ T9314] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1828.090395][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1828.101476][ T115] Buffer I/O error on dev loop5p3, logical block 131968, async page read [ 1828.110004][ T115] Buffer I/O error on dev loop5p3, logical block 131969, async page read [ 1828.118485][ T115] Buffer I/O error on dev loop5p3, logical block 131970, async page read 14:49:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x58, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000406008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x2}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x190, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x100}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x146}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x7fff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffff6}, {0x6, 0x11, 0x6b}}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:49:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$AUDIT_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3e8, 0x2, 0x70bd25, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0xd1) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r6) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r6, 0x6, 0x15, &(0x7f0000000000)=0x8000, 0x4) setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="050181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000007008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000009008000da55aa", 0x40, 0x1c0}]) 14:49:57 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000a008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) tkill(0x0, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r5 = syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000b008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x10020e00) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000108d3bb0a473178bc495dfd550000000002010000080600"], 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x5) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1828.637052][ T9332] loop5: p1 p3[EZD] p4 [ 1828.648990][ T9332] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1828.671398][ T9332] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1828.679585][ T9332] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x600, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000c008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x190, r5, 0x10, 0x70bd28, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x100}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x146}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x7fff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffff6}, {0x6, 0x11, 0x6b}}]}, 0x190}, 0x1, 0x0, 0x0, 0x20008800}, 0x20000000) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/net\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x8}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="070181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000d008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000e008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000011008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0xffffffffffffffff, r3, r4}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) r8 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0xc020f509, &(0x7f0000000040)={r8, 0x4, 0x1, 0x7}) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000012008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xfffffffd}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 1828.867191][ T9367] loop5: p1 p3[EZD] p4 [ 1828.884761][ T9367] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1828.911044][ T9367] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1828.920595][ T9367] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xd00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000001c008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) setfsuid(r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f00000000c0)={0x7, 'veth0_to_batadv\x00', {0x3}, 0x8}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f00000001c0)={0x7, 0x0, 0x20005, {{0xffffffff, 0x1}}}, 0x28) sched_rr_get_interval(r4, &(0x7f0000000080)) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='stat\x00') ioctl$PPPIOCGDEBUG(r6, 0x80047441, &(0x7f0000000180)) 14:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="080181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x58}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000026008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit(0x10000000003) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r5) ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) setns(r1, 0x20000000) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000000)=0x8) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000052d008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000003f008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000040008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) [ 1829.074330][ T9400] loop5: p1 p3[EZD] p4 [ 1829.087878][ T9400] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1829.101302][ T9400] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1829.109557][ T9400] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xe80, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="090181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000480008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0x2}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000fdef008000da55aa", 0x40, 0x1c0}]) 14:49:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') 14:49:58 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000effd008000da55aa", 0x40, 0x1c0}]) [ 1829.264926][ T9434] loop5: p1 p3[EZD] p4 [ 1829.269477][ T9434] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1829.290918][ T9434] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1829.315107][ T9434] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0a0181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000002008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) 14:49:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x1100, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0x8}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = getpid() sendmsg$netlink(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r6}}}], 0x20}, 0x0) lchown(&(0x7f0000000000)='./file0\x00', r3, r6) unshare(0x200) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r8, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000003008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000005008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000006008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffff000) 14:49:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x4, 0x80000, 0x7ffff5ff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000000)=""/192, &(0x7f00000000c0)=0xc0) unshare(0x200) socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1830.046030][ T9469] loop5: p1 p3[EZD] p4 [ 1830.051850][ T9469] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1830.066629][ T9469] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1830.074565][ T9469] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:49:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="120181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000007008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffff000) 14:49:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x2100, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0x58}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000008008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffff000) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000009008000da55aa", 0x40, 0x1c0}]) [ 1830.238871][ T9497] loop5: p1 p3[EZD] p4 [ 1830.248188][ T9497] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1830.269968][ T9497] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x7ffff000) 14:49:59 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000a008000da55aa", 0x40, 0x1c0}]) 14:49:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 1830.294228][ T9497] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2e0000000400000000000000000000000100000000000000000000000000000006800000000000000000000000009d2d484fa32f6520f04fc3598eef2354b26c095c4915a4982d9730bfeb2b8439cd35787c16ac90717849a5f466fc320927ef4d34a833fb579d6714ae40b7fe7e3c966d78be878658c736a07417b9000200003a1b575347d5482be51e1f7016532d757876f84bbb08bff6386598b5a07a961707aaa25e594980d6e0e26471a1a95c5b039374305c644743d47d87882ec27445c51c7af11827935cfb5c"], 0x2e) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x3, 0x2, 0x2, 0x0, 0x6, 0x1410, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x10000, 0x6}, 0x862, 0x1, 0x1, 0x0, 0x3, 0x1, 0x2}, 0xffffffffffffffff, 0xc, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x7f, 0x30, 0xd2, 0x20, 0x0, 0x400000000000004, 0x302, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x6}, 0x6f048, 0x5, 0xf251, 0x3, 0x401, 0x7fffffff}, r3, 0x6, 0xffffffffffffffff, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) copy_file_range(r4, &(0x7f0000000040)=0x4, r1, &(0x7f0000000080)=0x6, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x181001, 0x0) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000b008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x7ffff000) 14:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="640181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x3a00, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x2}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000c008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 14:50:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = signalfd4(r1, &(0x7f0000000000)={[0x161]}, 0x8, 0x80800) write$P9_RSTAT(r2, &(0x7f0000000040)={0x4b, 0x7d, 0x2, {0x0, 0x44, 0x8, 0x8, {0x4, 0x2, 0x2}, 0x26000000, 0x34, 0x6, 0x7ff, 0x7, 'ns/mnt\x00', 0x7, '+@^}\\\x06[', 0x2, '\x82(', 0x1, 'D'}}, 0x4b) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f00000000c0)) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000d008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000e008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000010008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000011008000da55aa", 0x40, 0x1c0}]) [ 1830.922842][ T9535] loop5: p1 p3[EZD] p4 [ 1830.928420][ T9535] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1830.953700][ T9535] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000012008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000001c008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="e00181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1830.966359][ T9535] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 14:50:00 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000026008000da55aa", 0x40, 0x1c0}]) 14:50:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x8}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1831.105958][ T9568] loop5: p1 p3[EZD] p4 [ 1831.110308][ T9568] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1831.120837][ T9568] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1831.129124][ T9568] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) unshare(0x400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020281000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004028000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r2, r1, 0x0, 0x7ffff000) 14:50:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x5800, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x58}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000038000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000002048000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000006048000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000080048000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000058000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 1831.824416][ T9603] loop5: p1 p3[EZD] p4 [ 1831.829001][ T9603] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1831.838239][ T9603] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1831.846962][ T9603] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020381000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000002d058000da55aa", 0x40, 0x1c0}]) 14:50:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x14, 0x2}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x800e, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:01 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000068000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004068000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 1832.585967][ T9634] loop5: p1 p3[EZD] p4 [ 1832.590619][ T9634] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000078000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 1832.626713][ T9634] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1832.642098][ T9634] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020481000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000098000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000a8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x14, 0x8}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000b8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 1832.850235][ T9660] loop5: p1 p3[EZD] p4 [ 1832.859393][ T9660] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1832.869955][ T9660] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1832.882684][ T9660] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000c8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000d8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020581000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000e8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000118000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x14, 0x58}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1833.110947][ T9691] loop5: p1 p3[EZD] p4 [ 1833.115282][ T9691] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1833.136581][ T9691] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x2, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000128000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020681000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000001c8000da55aa", 0x40, 0x1c0}]) [ 1833.176695][ T9691] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000268000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000052d8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000003f8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000408000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x6, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000004808000da55aa", 0x40, 0x1c0}]) [ 1833.425847][ T9726] loop5: p1 p3[EZD] p4 [ 1833.430484][ T9726] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1833.442676][ T9726] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1833.454534][ T9726] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020881000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000fdef8000da55aa", 0x40, 0x1c0}]) 14:50:02 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000effd8000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000028000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 1833.657303][ T9750] loop5: p1 p3[EZD] p4 [ 1833.670538][ T9750] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1833.689303][ T9750] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:03 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000038000da55aa", 0x40, 0x1c0}]) [ 1833.714834][ T9750] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0xd, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x0) 14:50:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020a81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000048000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x0) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000058000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000068000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x0) [ 1833.969665][ T9778] loop5: p1 p3[EZD] p4 [ 1833.974177][ T9778] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1834.001990][ T9778] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000078000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 1834.031788][ T9778] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000088000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000098000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020e81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 14:50:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x11, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000a8000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x14, 0x2}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000b8000da55aa", 0x40, 0x1c0}]) [ 1834.345939][ T9807] loop5: p1 p3[EZD] p4 [ 1834.355875][ T9807] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1834.382498][ T9807] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000c8000da55aa", 0x40, 0x1c0}]) [ 1834.406360][ T9807] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000d8000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020f81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000000e8000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000108000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="021081000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1834.599193][ T9837] loop5: p1 p3[EZD] p4 [ 1834.603766][ T9837] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1834.620116][ T9837] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1834.628987][ T9837] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x21, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000118000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000128000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff000000001c8000da55aa", 0x40, 0x1c0}]) [ 1834.785944][ T9851] loop5: p1 p3[EZD] p4 [ 1834.790404][ T9851] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1834.812994][ T9851] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote={0xac, 0x2}}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000268000da55aa", 0x40, 0x1c0}]) [ 1834.830479][ T9851] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008002da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008003da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="021481000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008004da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008005da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x3a, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008006da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008007da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="021081000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1835.099673][ T9883] loop5: p1 p3[EZD] p4 [ 1835.112204][ T9883] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1835.136338][ T9883] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008008da55aa", 0x40, 0x1c0}]) [ 1835.159074][ T9883] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008009da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="021b81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x4}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000800ada55aa", 0x40, 0x1c0}]) 14:50:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x58, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000800bda55aa", 0x40, 0x1c0}]) [ 1835.311970][ T9905] loop4: p1 p3[EZD] p4 [ 1835.321422][ T9905] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1835.337839][ T9905] loop4: p3 size 1912633223 extends beyond EOD, truncated 14:50:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @private=0xa010102}, {0x6}, 0x20, {0x2, 0x4e20, @private=0xa010102}, 'team_slave_1\x00'}) r4 = dup(r0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$XDP_MMAP_OFFSETS(r7, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x80) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r8, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000280)={0x234, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x118, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x54}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x0, 0x8, 0x5, 0x3ff}, {0x8, 0x1, 0x9, 0x7}, {0x2, 0x8, 0x8, 0x9}, {0x1, 0x81, 0xaa, 0x1}, {0x2, 0x54, 0x4, 0x4}]}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4cc4}}, {0x8}}}]}}]}, 0x234}, 0x1, 0x0, 0x0, 0x4040}, 0x20000080) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000800cda55aa", 0x40, 0x1c0}]) [ 1835.358828][ T9905] loop4: p4 size 3657465856 extends beyond EOD, truncated 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000800dda55aa", 0x40, 0x1c0}]) 14:50:04 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000001c008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000800eda55aa", 0x40, 0x1c0}]) [ 1835.421292][ T9911] loop5: p1 p3[EZD] p4 [ 1835.439518][ T9911] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1835.461288][ T9911] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008010da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008011da55aa", 0x40, 0x1c0}]) [ 1835.472439][ T9911] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="021d81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:04 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008012da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff0000000000801cda55aa", 0x40, 0x1c0}]) [ 1835.584268][ T9934] loop4: p1 p3[EZD] p4 [ 1835.600226][ T9934] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1835.633914][ T9934] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1835.644781][ T9934] loop4: p4 start 469762048 is beyond EOD, truncated [ 1835.656985][ T9949] loop5: p1 p3[EZD] p4 [ 1835.661286][ T9949] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1835.676243][ T9949] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1835.696646][ T9949] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0x58}, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008026da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="022581000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x2, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x3, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x4, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x5, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x6, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x7, 0x1c0}]) 14:50:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x3, 0xfa5d, 0xffffffffffffffff, &(0x7f0000000180)="f5502c02d56129ea3aff270402d80e362a364109da3da5d0c60620ff9c8c3b928f85ac333bcd8b5935bdb5f8ed3ed477c45c4464929c547a82aa7ec49330901d444af27e2ad1fa6618b1e0ff504372cf60c8d9d404bd1bee24f9ef42c59791820bd3bdc697b88955bba4211b4940e6422c979fa446d37f44a0352c", 0x7b, 0x1, 0x0, 0x2}]) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="400000001400210100000000000000ea024690bb86663e134c1d006800020000", @ANYRES32=r6, @ANYBLOB="1400020000000000000000000200ffffac1414001400080000020000000000000000ffffac1414aa3610a34fbee3ab48a5cba61ef5e7b8728930ec7a6c6effc3bc140426249926e0fae9e507568955be41e56a0c8f91d8e7ead808e965c99dcfd2748b143d328fe8bee837ad0f48a5631364b3e1f551994368b2e59f250de2c9ff275af3714323e062bead442d6c592477c32ba08d5974c15d9d4d042ec7c11efb531fcd1d8d332b72259384a6e8940c634e2e662f1c495da2a067f195a344f4c583aa85fd5dc808f9ee95cba53de0c388b70c1a4a993ecc44e59f15a4021865c0f0242391051819af"], 0x40}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@deltclass={0x78, 0x29, 0x100, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0xfff3, 0x3}, {0x2}, {0xd, 0xffff}}, [@tclass_kind_options=@c_sfq={0x8, 0x1, 'sfq\x00'}, @TCA_RATE={0x6, 0x5, {0x0, 0x81}}, @tclass_kind_options=@c_ingress={0xc, 0x1, 'ingress\x00'}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x24, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x1}, @TCA_QFQ_LMAX={0x8, 0x2, 0xcb}, @TCA_QFQ_LMAX={0x8}, @TCA_QFQ_LMAX={0x8, 0x2, 0x2329}]}}, @tclass_kind_options=@c_skbprio={0xc, 0x1, 'skbprio\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x4804}, 0x80) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000400)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r5, @ANYBLOB="00002cbd7000fedbdf25010000000c000100736b627072696f0008000700ac14142b"], 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x14011) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="138f45f09f988c9897", @ANYRES16=r5, @ANYBLOB="0a0026bd7000fddbdf2503000000140005000000000000000000000000000000000008000c0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x894}, 0x8010) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r5, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x30}}, 0x20000001) unshare(0x200) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r7, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1836.362537][ T9978] loop5: p1 p3[EZD] p4 [ 1836.372421][ T9978] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1836.396842][ T9978] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x8, 0x1c0}]) [ 1836.423346][ T9978] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="022c81000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:05 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x9, 0x1c0}]) 14:50:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xa, 0x1c0}]) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xb, 0x1c0}]) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xc, 0x1c0}]) 14:50:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0xe80, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xd, 0x1c0}]) [ 1836.666290][T10006] loop5: p1 p3[EZD] p4 [ 1836.670798][T10006] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1836.695580][T10006] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1836.705305][T10006] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x4000400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xe, 0x1c0}]) 14:50:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="02e081000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xe40, 0x1c0}]) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xfdef, 0x1c0}]) 14:50:06 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x87ffe40, 0x1c0}]) [ 1837.447933][T10041] loop5: p1 p3[EZD] p4 [ 1837.457943][T10041] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1837.471962][T10041] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1837.487237][T10041] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r2, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r4, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @rand_addr=0x64010100, r4}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1837.548827][T10048] print_req_error: 8 callbacks suppressed [ 1837.548839][T10048] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1837.567205][T10065] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. [ 1837.569649][T10062] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:50:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020180ca0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1837.585820][T10041] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1837.596778][T10063] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1837.624514][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1837.636525][ T115] buffer_io_error: 2 callbacks suppressed 14:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1837.636534][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1837.658819][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1837.670271][ T115] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1837.686533][ T115] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:50:07 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x200001c0, 0x1c0}]) 14:50:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1837.698154][ T115] Buffer I/O error on dev loop5p3, logical block 131968, async page read [ 1837.708196][ T115] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1837.719547][ T115] Buffer I/O error on dev loop5p3, logical block 131969, async page read [ 1837.735981][T10073] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 14:50:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810003ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x7ffff000, 0x1c0}]) [ 1837.926318][T10089] loop5: p1 p3[EZD] p4 [ 1837.930842][T10089] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1837.948541][T10089] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1837.967071][T10089] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810005ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1838.139505][T10106] loop5: p1 p3[EZD] p4 [ 1838.143910][T10106] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1838.152524][T10106] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1838.161582][T10106] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1838.352930][T10065] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:50:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xfffffdef, 0x1c0}]) 14:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810006ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810007ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:08 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x7ffffffffffffe3f, 0x1c0}]) [ 1838.516340][T10125] loop5: p1 p3[EZD] p4 [ 1838.520826][T10125] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1838.530125][T10125] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1838.538900][T10125] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1838.687953][T10140] loop5: p1 p3[EZD] p4 [ 1838.692440][T10140] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1838.703142][T10140] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1838.721319][T10140] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000000)={0x3, 0xffffffff, 0x1000000}) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810009ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:08 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xfffffffffffffdef, 0x1c0}]) 14:50:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1839.348064][T10169] loop5: p1 p3[EZD] p4 [ 1839.364148][T10169] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1839.387112][T10169] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1839.403892][T10169] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:08 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x8800000}]) 14:50:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000aff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:08 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x7fffffffffffffff}]) 14:50:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1839.594281][T10187] loop5: p1 p3[EZD] p4 [ 1839.601143][T10187] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1839.629286][T10187] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1839.646873][T10187] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000bff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1840.216019][T10204] loop5: p1 p3[EZD] p4 [ 1840.220767][T10204] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1840.233382][T10204] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1840.263572][T10204] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:09 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000cff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYRESDEC, @ANYRES16=r6, @ANYBLOB="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", @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r6, 0x511, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x4058080) r7 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r7, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r7, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:usbmon_device_t:s0\x00', 0x25, 0x3) 14:50:09 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1840.450562][T10224] loop5: p1 p3[EZD] p4 [ 1840.454898][T10224] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1840.477505][T10224] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1840.495767][T10224] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:09 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = open(&(0x7f0000000000)='./file0\x00', 0x410200, 0x40) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r1, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88000}, 0x48000) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 14:50:09 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000dff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) lseek(r2, 0xac, 0x4) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r4) write$P9_RLOPEN(r4, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x2, 0x1, 0x8}, 0x7}}, 0x18) clone(0xd1030200, 0x0, 0x0, 0x0, 0x0) 14:50:10 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8010) 14:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xa3) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1840.646634][T10257] loop5: p1 p3[EZD] p4 [ 1840.651562][T10257] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1840.662449][T10257] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1840.687708][T10257] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./control\x00', 0xa4000dda) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000000)={0x7, 0xba}) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000eff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = eventfd(0x80) read$eventfd(r3, &(0x7f0000000100), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/121, 0x79}) 14:50:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f0000000300)='Y', &(0x7f0000000480)=""/244}, 0x20) syz_read_part_table(0x1f, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000ffa0a000000ff45130000ffffffa500e9311980170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x39, 0xfff}]) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040)="f5a2a4d6c86f1c1e888e84173e142538564f91d4d6ede5eac5112e791cae7704e524db5844ebb366e8378ce159c8b70fff4a4fd543bab20d488c3f0a83aa7be5e4c2", &(0x7f0000000100)=@tcp6=r2, 0x2}, 0x20) 14:50:10 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 14:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 0: syz_read_part_table(0x7fffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1840.866558][T10285] loop5: p1 p3[EZD] p4 [ 1840.871044][T10285] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1840.890309][T10285] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1840.899581][T10285] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181020fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1841.039279][T10317] loop5: p1 p3[EZD] p4 [ 1841.043673][T10317] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1841.058641][T10317] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1841.070943][T10317] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181030fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:10 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:10 executing program 0: ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000002c0)={'netdevsim0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}}) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYRESDEC, @ANYRES16=r4, @ANYBLOB="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", @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x361c}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040020) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x800, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4040010) 14:50:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000000)={0x2, 0x2, 0x3f, 0x1f, 0x7}) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:11 executing program 0: syz_read_part_table(0xfffffffffffffefd, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000080)={0xffffffff, 0x3677, 0x1}) 14:50:11 executing program 0: syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000f7b0a000000ff45a40000ffffffa500e931190000000000000680170003550020000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x7}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000200)='./file0\x00', 0x80, 0x43) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="f80000000109010300000000000000000a0000020c000480080001408000000108000540000000121800020006000340000200000c0002800500010000000000080003400000ffff080003400000800008000340fffffe018c0002000c000280050001001b0000000c00028005000100110000000c0002800500010011000000060003400004000006000340000300001400018008000100ac1414bb08000200ffffffff1400018008000100ac141427080002000a0101002c00018014000300fe8000000000000000000000000000aa14000400ff02000000000000000000000000000108000640000000000c000480080001400000040023c4205697744d40477c6a4227f3fdeaa2bbb9f43f0b174aaac41dbdc17d7486ea47d5d3090817b11296e05e152eaf378e5a8a6e537645dd1c36a73b0f288b97cdf7cc4445b0b8ae0432a7111b0185ae133bc928b335baf1fa58fae8e071b6bc0e500b02a62f5136250d5caa8bc3145f0dfa5cefcfdf7b994fe63627b1e3cad69ecdee9d4852722b2e482fffc750ef823308"], 0xf8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r4, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x5}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) [ 1841.689192][T10349] loop5: p1 p3[EZD] p4 [ 1841.695561][T10349] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1841.712279][T10349] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1841.720934][T10349] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:11 executing program 0: syz_read_part_table(0x7fffffff, 0x6, &(0x7f00000002c0)=[{&(0x7f0000000000)="aa8bb2879e7e01a1aef6fe4d7daed930a60442dd95bbee59fecfc05ae3752bcc058c88de33110f174c91dd8ba10e3a245342e3df97230f629c1ea7befeab192a243052c3862739241b824835762b968ae9eec689a235e9a1c9ffe9127654be9d9120f5c9cdf080df6aa6d9cf92d1f844646aef60e6e5db5501d888253d0446", 0x7f, 0xffff}, {&(0x7f0000000080)="7d368d1a6f2a80cfcb1c4ddaeaa450c602564aeafca077118f55bd0414e49860bbedad0aa41328ffedc9a7add704f173e9", 0x31, 0x401}, {&(0x7f00000000c0)="2e6e06d704ae6a2ffc7aea983cf510211c64880f92e681cb0f72dddc418d573ab9b3c55ff08d36d5a0d1df3a14d4eec649929e", 0x33, 0x1000}, {&(0x7f0000000100)="fad5ffcb0f578c6b2c66982332f73fdd78ed461bc68df97757d64a4fc911624578f0ec562c11bc444060e7fc6e43fe7ebcb89fe18f305e0d3b173af4e34381616fc1fe3c8423c800dcbb0438a84e497a7238a32edd98c194bf9e9d87a257fb8df22166cdbca1913b0c2cc6c83c8f052c78cbee867a6c19d20a28fecfc848574318d889e781154d3da8a92eff5cfc472797532beb665f", 0x96, 0x77}, {&(0x7f00000001c0)="e0f12a4b1605bcf89b36fbed57f99fa6b54dd4c4a9778a27d804eef7303bee51217d6b27e1c7915093bde6b3f442f37d12f8b893e1a8b5584eadd7b87247ad8c8179f8d8385b53f3e3990139f710ec8f14837c9d80c65080bc2c35d2e68e4fd512e125f0f04cf8a6d9493a05ea85b9fce291e2b67182cb66dc77", 0x7a, 0x1}, {&(0x7f0000000240)="3a23780a2f269bf3d346a529ca6360487ca0a2d02102af8932dea8396f997147aebc80efd11164676fdeb0d1f1eec48d97483a1802f410182bb940aefb8ebef6f91cc455b57b16c2366e949bd4", 0x4d, 0xffffffffffff958d}]) 14:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181040fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r5, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r7, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', r7, 0x29, 0x5, 0x9, 0x9, 0x20, @private1={0xfc, 0x1, [], 0x1}, @private2, 0x7, 0x7800, 0xea89, 0x7}}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x2, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r9, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r11, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x68, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r11}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x68}}, 0xc000) 14:50:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x4}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1841.926231][T10374] loop5: p1 p3[EZD] p4 [ 1841.930538][T10374] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1841.952484][T10374] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181050fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1841.974966][T10374] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1842.177023][T10405] loop5: p1 p3[EZD] p4 [ 1842.181422][T10405] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1842.191517][T10405] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1842.200031][T10405] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:11 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x41e, 0x1, 0x7, 0xb5, 0x2, r0}) 14:50:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181060fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:11 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x8, 0x0}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/3, 0x3, r1}}, 0x10) fchdir(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f0000000d00)=""/42) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x1, 0x7, 0x0, 0x3, 0x2, 0x6, 0x0, 0x278, 0x40, 0x341, 0x1000, 0x4, 0x38, 0x1, 0xa494, 0x9}, [{0x3, 0xfffffffe, 0x2, 0x8, 0x8, 0x775, 0x3, 0x2}], "cbb5adaf547d0cd32b134ec9aefec95ffeddc31a07a3eb23fdafc5f5b3ce243c8c80bfc0fdfb328fec6f2f7700672366d1fe3b41864f985299cea7b4288eae4d05c8b4084d34e933c76e5583592f8173b3ce4ff49c75a7eed17b33f9ee4a97d03ba1ad151347ec4990caa953dd0ed047aa28445c33445389759c447d2208cd9fd0838c7281944663dc284e513a6d9870a7c700337409f105fc43e54ade15ca03b1477146fc665cdefbf4b7e2e9b3f598538b582cd9aacf8370a736e8", [[], [], [], [], [], [], [], [], [], []]}, 0xb34) 14:50:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1842.546232][T10422] loop5: p1 p3[EZD] p4 [ 1842.556600][T10422] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1842.587626][T10422] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1842.605154][T10422] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:12 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x38, r2, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x24, 0xe, "080fec1b94dc5b4f3ee83ea2a259123e3a79acfe0b10083f5465cd9670f1e4d1"}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x81300140}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x43c, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_PBSS={0x4}, @NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x0, @local}, {0xa, 0x0, @remote}, {0xa, 0x0, @multicast}, {0xa, 0x0, @local}]}, @NL80211_ATTR_SMPS_MODE={0xffffffffffffff71, 0xd5, 0x1}, @NL80211_ATTR_IE_PROBE_RESP={0x3b6, 0x7f, "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"}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x0, @broadcast}]}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x43c}, 0x1, 0x0, 0x0, 0x4040810}, 0x4040000) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x2d, 'io'}, {0x2d, 'pids'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x2d, 'pids'}, {0x2b, 'pids'}]}, 0x24) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181070fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f00000002c0)="e064aad1fa0d93c3210d7644", 0xc, 0x96}, {&(0x7f0000000300)="dd6b82fecb092f2b7ff9d59522010426938674e604fdf2abb7f5f31467253420f7146d4cbfba3f35207bbf44c193a49bb2d4f1a4f6569f1f552decc01b960aa425cbd56a6172203aaccf4ec5476d6b39436612d56aa23241f07d861ee8c18e0ebcf65238baf2e37a61787e1502a3f364314d4dbf4d31b5f5bee97477c16c7d6194133977b16e18d56714e447039836a7b9ce5c3b622bdb2420b05558bcbc38179762bcaeaebc1523266ecd249d257feddc024749d8bac98559cfa39c9149f4ee1386312713532d76b8763e7f0fc435f6d666e4005868895f9a30f78f44c0d5", 0xdf, 0xfffffffffffffffc}, {&(0x7f0000000000)="453b098c9a99ffdfa99a39a2647954132ee8ce7c06551626722148a986385ce50efe8a1d17dbf7de13437774b851a0e6536084cbde21dd2de6164d9f5f82d1a59fc56051c38221d6be697e9ccbef3f8f4976ba5ecb735b43d91a29631c596a9c2ef87a0f0d55416dcf8dcf6a2eb04cbbca08a2c296509671fe237e8badcaf55c1828c924cfe6e43546f2b3883ffc212f8f983c0687b7bb12cf9e429cdad0a0487abf4dbbf84de59db1cdedda4dcbd7c43597aff641a146327715d58d716c5ce3a061decf3fd9f2532404bc3d25c4981fa021f35a7c01c34df88d129d", 0xdc, 0x6}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) sendmsg$sock(r0, &(0x7f0000000740)={&(0x7f0000000480)=@hci={0x1f, 0x0, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)="bf0fb020b1e8a406f0a26c1a10cc7b91918417b9063bfc780057106cf7c8cecf88c3985b65729916aa08da05e0624bd2f47df88144172dd1981d2e8b98936ac8b434278536b1a3d099c969622fbc6de59c4ce8838d3369b0c6e342593106e2ebcafb87a277dd3c9765d51976d774300ac98dde1912a895c89fde483c97d2ccbdf9a1cea066309611b2bd43227400432c0baf53ae00988100792d2325b3d9c723b3e400704805f66e210bdc926a4cc8060f88898b8a9acb0946d7b93740304128db8f1855d6c5cb945e1c1c98cf882e36a2c1a01c6121e3e13810ab565aadbbf1343db6", 0xe3}, {&(0x7f0000000600)="913ab9bc27191ad6470c091167e92b9c24877acc289abcb2fcb6d56a3227a7df5ed9d8654b8e084b890c60806d8871a655e0fbbb3a85dc6fc261c512b257b38c027658eccddf13ed5f88ed20b00f393b7e6c9977aec930adf79e4013d6313730a43f3097eefa6a4630732c54ea6975343388a551e914384d4083838528c0b4bdc568ccdd559f2db7a16bc28747036ed31b8ef7f02528f214f1075766e87736d3dc056b1b9e4f299cb4194083d3c49a98dabc16cd4240c2e57e61fb", 0xbb}], 0x2, &(0x7f0000000700)=[@mark={{0x14, 0x1, 0x24, 0xfffffffb}}, @timestamping={{0x14, 0x1, 0x25, 0x400}}], 0x30}, 0x20044044) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5800ffe7", @ANYRES16=r2, @ANYBLOB="00022dbd7000fddbdf2507000000080007000a01010114000500fe8000000000000000000000000000aa14000600fe8000000000000000000000000000aa1400050000000000000000000000ffffac1414bb"], 0x58}, 0x1, 0x0, 0x0, 0x880}, 0x4004041) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000000)="088165d5989a2596d5645eb2d019af3e51163d6310db79444f242544ad4fe16b7f68bb8986c71a7c4dd1d4350c26064c92c76982d41902716bfb477ce6cebbea35fb5aa4e46ebdb9f91d887d0f3f1b05b6bdf26cdac5895355cf4ac1ecfd6429ef82dc759c521a3a232b116cf9e1b4ded2079a3e2efcb035c5c0dd494d67fc87292f", 0x82, 0x2}, {&(0x7f00000000c0)="96d1f6068a3de6e58450e82c8e63a5752299a636e29365694e670909763e697485803072fd30cb1aade3c60fed883e29616975ba6880e663356c0e96e6d2b6b2e96abaeb9b95f06fb0cd1062ae2dbcb07ea6eb15449fae1b02b186bbaa32db6392f91b5d728e6753c89b8554cd317f6a93e655302cc1b6c612e0821c686a2d0b4becf065a2409791910af16033662fddac1d96f3015ad819e12e933ad5a60ea26b41be14367e170d4108d8eba7abfcb55d7c2b90bae2f781d07e52ed90aa3c2b27236097bc", 0xc5, 0x4}]) [ 1842.796189][T10450] loop5: p1 p3[EZD] p4 [ 1842.800666][T10450] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1842.827729][T10450] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1842.860068][T10450] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x8001) r4 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) 14:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181080fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x14}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 0: syz_read_part_table(0x0, 0xcd0, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x11}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1843.091339][T10480] loop5: p1 p3[EZD] p4 [ 1843.103186][T10480] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1843.124619][T10480] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:12 executing program 0: syz_read_part_table(0x0, 0x2d, &(0x7f0000000140)) [ 1843.148144][T10480] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181090fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000000)="ce241e522e99ace290e5320fc3fd7debfc7b5530b2bb7929e2992d02e150761facbbe11e9badf61dbd44433bd0a3170fff0de72c43afb55b6d1fddcf1822f1920783ea14ef0eeb461bce40ec0f0eef03259a90eade01eb9e3b18822516d57c7534568deb1182a2ce9c46df0c012ab8956f2b4ded23e5009ef03283d309d8c67ff76897bfea25a1b10014f5cc082a2a21e07e77ebe98031a37fa01bfcdd", 0x9d, 0x1c}, {&(0x7f00000000c0)="fa005a97e8fc6eb63f3ac1716dae95a04c7638cb1ce2115440b9b0d9a13266a8a1d7be991d4595488e93f2892bcbd3", 0x2f, 0x10000}, {&(0x7f0000000100)="bcfc96f6584ff0d708536f72a52e3b0bb7e4bdcb63e97642a9485f0bc4ca546707f4bab94ee71317e515e3bd96fcd0a7a778e72da0d23a41c89b469fb2fabb4aba4004000f9b7890d16d9d8c2b518cfa2b04c7f3cf01b1df3b40f13d18a16250bb2a24a6e81373b379", 0x69, 0x9}, {&(0x7f0000000180)="9ac52650fa227018f15869a6bf4713e63d0dad416a64df7971c0f698b45a541d40392bb8d089fd1790c82263df85454be69c44386fc6f930830fdc810ae30f08e3d645ef4f65a85ae1f667483da9b106becce6840a64eea33834324fb5886ee86dcd7639b49317b169d1650d1a29be6d36c6d39c3d4240b3ff1fc299915c7e932bb647f98f2a9715a72c648fc8b28f4222d480c5ed3f4e003b05282b1e296dd8f70261c541ddebbc8764ea4c3262d6f5688d02436e14980c7e5c3e6a89b9fc4409774baeeed34b9340ecab69675c4dbb1aabddc5bc7198", 0xd7, 0x800}]) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x2]}, 0x8) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xa0000, 0x40) linkat(r0, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x0, @private=0xa010102, 0x4e22, 0x3, 'dh\x00', 0x6, 0x101, 0x1b}, {@multicast2, 0x4e24, 0x0, 0x6, 0x7, 0xff}}, 0x44) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1843.371086][T10502] loop5: p1 p3[EZD] p4 [ 1843.375507][T10502] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1843.397577][T10502] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 0: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[], 0x8) fallocate(r0, 0x3, 0x2, 0x18e7) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1843.418366][T10502] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYRESDEC, @ANYRES16=r4, @ANYBLOB="00002bbd7000fedbdf250200000008002b000400000004f47f5d4e7c47c0ac5fbd698e18a222deb49116352eb2354772bbbe61e04b562da7e94a85df3b6b2aa05cd0f1d3f4f10931a73720dc6ec88feb3d278e4694b03ef3265c2b67e13dd4e8bb88f16fe5dc45db45ce0cda4634c07d7cd71ce93ef4bf76505e081cf3b32ed28bccc36ddf47092fa83ec0d9c3b4e3cc9b1de48737ded5a9d9928f6bf6619d2277595add6d889689845024c7e9a4f6614785e78d2a0824c233acb68369c1f1baba55082e2a392a3177eea5de4f0fb4634740b8345056bd87bd6f5e273b5ba70300000000000000f761e76edee5cc4bbcc670210a344f46f5aeec5a2e0003c1ab609bfce7f47a1995de09d9642f08003c670ed22d23e5c764597592c3728cfc1d846f7dbc611956137163d63d84362455b3c251d2a4ecef671b68af487fb3befb436ac772aabf92c31ead1db3080442266afe96702fe68e510bdd01945bd0046df6ff8a05c758a4c6b19b2d4946d9d1580c1ed4fe8b081c03832e2a98a7970a4eb9ce994ed85feaf41a6ab018d6a2707d307f05ae437202eecb20d23e639b9dc79a7d63b08215c6b0c692e0f13768274b9d5a5e704de3923f31c015c97ce458f1bfe49b5aebf537812c9afe3c972345b846faeb92b782538ff80b0a7ccace447fb86a7d2fae1f28039c2f728317928f2aa9a1a3f1bb8f2cad9f4525d7f2bf103047afc68592752d2d342dc11183560505d570876b74859f57dff01193e593c54a926347c7764e497fff7288ecb941faa5b3f8ec15645d2c400d44fde95b1e3fd6f64c0b2262a65cf71b6db3c9451dfcf3a416cdc01ce3126d62bd2e907ddbf6f185c6948727aa7b34d18d4dbdf03f25ec6f", @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x804) 14:50:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x21}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810a0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:12 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000300)="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", 0x15e, 0x1c0}]) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x7fe000000000000]}, 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000180)={0x200, 0x20, 0x1, r3}) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0xf, 0x0, 0x0, {{}, {0x0, 0x4108}}}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x20, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", "", "", ""]}, 0x24}}, 0x4000001) 14:50:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810b0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1843.686253][T10538] loop5: p1 p3[EZD] p4 [ 1843.691190][T10538] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1843.700890][T10538] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1843.720210][T10538] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x29}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) syz_io_uring_complete(r1) r2 = syz_io_uring_complete(r1) signalfd(r2, &(0x7f0000000000)={[0x5]}, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) bind(r3, &(0x7f0000000040)=@phonet={0x23, 0x0, 0x6}, 0x80) syz_read_part_table(0xffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x3a}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) waitid(0x2, r0, &(0x7f0000000480), 0x8, &(0x7f0000000500)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r3}, 0x10) socketpair(0x4, 0x800, 0x100, &(0x7f0000000000)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES16=r5], 0x34}, 0x1, 0x0, 0x0, 0x4044052}, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x22c, r5, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x60}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x37d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x27}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf3e}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x24}]}, @TIPC_NLA_NODE={0x16c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xf6, 0x3, "3dda2a7ecb165e1f1f291b09e2e9102d11c77f09b4724a76a5e59876e1b53bfd0fd3776d80da2c2d9a5118a531077736ca65f77401d6f72afb56f08c67bb750361d806dfa6e8e6e5b6fbc175ee4d0e53832ea5305f76a35920987366ebfb73692966fdc431b7664ed41ada8ff85c24a88e18e0a1d99fae1149437ac29180278d109c19243f63059cbe013a391574ab2be7b9b67a08ce4dc9a3defb6db3915041a49d26076718b089971bd5ce5246ac1d4e3f1d3519178ab50b21d9c422f55c47f21bc48088984b653590620ad3e970c3b11a3e3993de980db12a17410ac473fd31ea0173f68fee1edfc6542c85e5f028022a"}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "47d18f770c817c834345f11a27e671c6a920601f927deab725fb37af6f5257789797"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3d}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x4080}, 0x20080) [ 1843.876547][T10558] loop5: p1 p3[EZD] p4 [ 1843.880945][T10558] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1843.894721][T10558] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1843.908344][T10558] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000000)='\x00', &(0x7f0000000040)) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810c0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2b}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x58}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024a00, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x24, 0xe, "080fec1b94dc5b4f3ee83ea2a259123e3a79acfe0b10083f5465cd9670f1e4d1"}]}, 0x38}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', r5, 0x2f, 0x4, 0x8, 0x5, 0x69, @mcast2, @empty, 0x80de, 0x7800, 0x5, 0x1}}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x2, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r7, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r9, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x1d2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r9}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x101, 0xf7}}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000080) 14:50:13 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) clock_getres(0x2, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm], 0x1) fchdir(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @loopback}, @in6=@private2}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) 14:50:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1844.438897][T10585] loop5: p1 p3[EZD] p4 [ 1844.443243][T10585] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1844.455468][T10585] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:13 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) [ 1844.479786][T10592] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. [ 1844.483628][T10585] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x6) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x3c, 0x2, 0xfffffffe) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./control\x00', 0xa4000dda) sendmsg$nl_route(r3, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[], 0x44}}, 0x20000080) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r6) ioctl$int_in(r6, 0x5452, &(0x7f0000000100)=0x7) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000040)={@private0, r4}, 0x14) 14:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810d0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioprio_set$uid(0x0, r1, 0x4000) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1844.545171][T10603] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:50:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CHAR_RAW_SECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000040)=0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000000)=0x5) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000800)={0x138, 0x0, &(0x7f0000000640)=[@dead_binder_done, @clear_death={0x400c630f, 0x2}, @increfs={0x40046304, 0x2}, @release={0x40046306, 0x3}, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000280)={@ptr={0x70742a85, 0x0, &(0x7f0000000080)=""/98, 0x62, 0x0, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f0000000180)=""/227, 0xe3, 0x2, 0x2b}, @fda={0x66646185, 0x3, 0x0, 0x28}}, &(0x7f0000000100)={0x0, 0x28, 0x50}}, 0x1000}, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x68, 0x18, &(0x7f00000003c0)={@fda={0x66646185, 0xa, 0x0, 0x3c}, @fda={0x66646185, 0x4, 0x1, 0x1a}, @ptr={0x70742a85, 0x0, &(0x7f0000000300)=""/135, 0x87, 0x2, 0x3}}, &(0x7f0000000440)={0x0, 0x20, 0x40}}, 0xb43dd57387543c09}, @dead_binder_done, @release, @increfs_done, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000580)={@ptr={0x70742a85, 0x1, &(0x7f0000000480)=""/96, 0x60, 0x0, 0x33}, @fda={0x66646185, 0x7, 0x1, 0x3c}, @ptr={0x70742a85, 0x0, &(0x7f0000000500)=""/78, 0x4e, 0x2, 0x7}}, &(0x7f0000000600)={0x0, 0x28, 0x48}}}], 0x6e, 0x0, &(0x7f0000000780)="677bb0e5779cfe0a382035539fb70c1b3d474ac305e777e1e244d2c070ddb058d43cb14a9be7e23f01729836643221e6c6e1d71ffe669acf4368bd05fb81f46157ee396e641dec6ff5fb69b8f7cc347daf11b9e132830c0148cd295af8501fb5f8c729b3e9b0e059810897760946"}) 14:50:14 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$inet(r3, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000400)=0x10) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000c40)={0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="0000055d178736a372a6d6346561e4748529fda57ff29b1bdde2cef5a52930a55ce003099d420f1e13487982a9e619d735fbfa1654b794aaf6b9930e5b69c8441329226db76a7cdc18c3fa628bb2a25a68b8f9614ce7da687790941acdba8d8b55aee45678e892ca7d138d7fade0cabc22169a6c2d8809bddca229ca72c0229590a219"], 0x0}, 0x0) syz_usb_control_io$cdc_ecm(r0, &(0x7f00000003c0)={0x14, &(0x7f0000000000)={0x40, 0x2, 0x81, {0x81, 0x30, "7dde43c87ecb477e25bacd3961ee36e00282e9738439bd686776ec3b9f4d6603e4a73d9c4a6a5dcc9800ee3220562f3f01152667bc4e18dd03600d3c40801091659f304c98ba9dbd357e2ed54bf3814ba9cd3f1dddf50075ded9efb65659f50c6b28b8e4fefb4f325af20f3ca0676dd9b2f1a0002da94c1f8c5e86e357f8c0"}}, &(0x7f00000000c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000380)={0x1c, &(0x7f00000001c0)={0x0, 0x14, 0x100, "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"}, &(0x7f0000000300)={0x0, 0xa, 0x1, 0xbc}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x3}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r4, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r6, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000600)={'ip_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', r6, 0x8000, 0x20, 0x0, 0x4, {{0x23, 0x4, 0x0, 0x4, 0x8c, 0x64, 0x0, 0x4, 0x4, 0x0, @multicast1, @multicast2, {[@cipso={0x86, 0x47, 0x0, [{0x5, 0xd, "f2b127faaae34b70cb3e61"}, {0x6, 0x11, "331a1d97ed2e17c6fbc4be5d0f8824"}, {0x2, 0xa, "d3d28a6dd0243e21"}, {0x7, 0x7, "050dbc9acd"}, {0x6b4300035dce44ba, 0x4, "6cdb"}, {0x0, 0xe, "be4e22373445df815df28c08"}]}, @end, @timestamp_prespec={0x44, 0x1c, 0xda, 0x3, 0xc, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x3}, {@multicast1, 0x8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7e1}]}, @ra={0x94, 0x4}, @generic={0x7, 0xf, "9980326955a7391d4d60cae91c"}, @noop]}}}}}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r8) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x80000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000480)='syzkaller\x00', 0x7f, 0x6, &(0x7f00000004c0)=""/6, 0x41000, 0x0, [], r7, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x10, 0x0, 0x7ff}, 0x10, 0x0, r8}, 0x78) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x600}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1844.647647][T10617] loop5: p1 p3[EZD] p4 [ 1844.662159][T10617] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1844.676365][T10617] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1844.699080][T10617] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810e0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2f}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1844.880208][T10640] loop5: p1 p3[EZD] p4 [ 1844.884546][T10640] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1844.893150][T10640] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1844.901918][T10640] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181100fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xd00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1844.958335][T19597] usb 1-1: new high-speed USB device number 23 using dummy_hcd 14:50:14 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181110fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1845.028504][T10653] loop5: p1 p3[EZD] p4 [ 1845.032790][T10653] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1845.043225][T10653] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1845.051220][T10653] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x3c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1845.186018][T10662] loop5: p1 p3[EZD] p4 [ 1845.190325][T10662] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1845.200600][T10662] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1845.208550][T10662] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1845.218493][ T157] loop5: p1 p3[EZD] p4 [ 1845.226578][ T157] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1845.234461][ T157] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1845.241829][T19597] usb 1-1: device descriptor read/64, error 18 [ 1845.248525][ T157] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181120fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1845.586170][T10677] loop5: p1 p3[EZD] p4 [ 1845.592019][T10677] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1845.601566][T10677] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1845.610037][T10677] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1845.655692][T19597] usb 1-1: device descriptor read/64, error 18 [ 1845.668413][T10679] blk_update_request: I/O error, dev loop5, sector 86144 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1845.668655][T10680] blk_update_request: I/O error, dev loop5, sector 86026 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1845.680230][ T115] blk_update_request: I/O error, dev loop5, sector 86144 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.692026][T10677] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1845.703837][ T115] Buffer I/O error on dev loop5p1, logical block 86144, async page read [ 1845.712490][T10681] blk_update_request: I/O error, dev loop5, sector 86144 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1845.719035][ T115] blk_update_request: I/O error, dev loop5, sector 86145 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.741285][ T115] Buffer I/O error on dev loop5p1, logical block 86145, async page read [ 1845.749699][ T115] blk_update_request: I/O error, dev loop5, sector 86146 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.760963][ T115] Buffer I/O error on dev loop5p1, logical block 86146, async page read [ 1845.769363][ T115] blk_update_request: I/O error, dev loop5, sector 86146 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.780625][ T115] Buffer I/O error on dev loop5p4, logical block 86146, async page read [ 1845.789015][ T115] blk_update_request: I/O error, dev loop5, sector 86147 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.800243][ T115] Buffer I/O error on dev loop5p1, logical block 86147, async page read [ 1845.808634][ T115] blk_update_request: I/O error, dev loop5, sector 86147 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.819959][ T115] Buffer I/O error on dev loop5p4, logical block 86147, async page read [ 1845.828336][ T115] blk_update_request: I/O error, dev loop5, sector 86148 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1845.839575][ T115] Buffer I/O error on dev loop5p1, logical block 86148, async page read [ 1845.847959][ T115] Buffer I/O error on dev loop5p4, logical block 86148, async page read [ 1845.856373][ T115] Buffer I/O error on dev loop5p1, logical block 86149, async page read [ 1845.864719][ T115] Buffer I/O error on dev loop5p4, logical block 86149, async page read [ 1845.925708][T19597] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 1846.195730][T19597] usb 1-1: device descriptor read/64, error 18 [ 1846.585698][T19597] usb 1-1: device descriptor read/64, error 18 [ 1846.705848][T19597] usb usb1-port1: attempt power cycle [ 1847.415709][T19597] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 1847.585789][T19597] usb 1-1: device descriptor read/8, error -61 14:50:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:50:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xe80}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x58}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYRESDEC, @ANYRES16=r6, @ANYBLOB="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", @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x50de}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3f}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x20008045}, 0x0) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181130fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000200)=""/68, 0x44}) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$lock(r6, 0x26, &(0x7f00000000c0)={0x1, 0x2, 0x80000001, 0x80000001}) [ 1847.726028][ T22] audit: type=1326 audit(1596725417.139:33): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10688 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45fb1a code=0x0 14:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181220fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1847.769038][T10695] loop5: p1 p3[EZD] p4 [ 1847.776669][T10695] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1847.784733][T10695] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1847.793497][T10695] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1847.805795][T19597] usb 1-1: device descriptor read/8, error -71 14:50:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x600}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/pid\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x610000, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000940)=ANY=[@ANYRESDEC, @ANYRES16=r5, @ANYBLOB="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", @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r5, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80000001}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x73e}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008004}, 0x4000881) 14:50:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x11, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000200)=0x94a, 0x4) sendmsg(r4, &(0x7f000087dfc8)={&(0x7f000005e000)=@nfc={0x27, 0x7}, 0x80, 0x0}, 0x0) recvmsg(r4, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1847.930170][T10710] loop5: p1 p3[EZD] p4 [ 1847.935047][T10710] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1847.953708][T10710] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1847.961998][T10710] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181240fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1100}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:50:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xd00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1848.096643][T10724] loop5: p1 p3[EZD] p4 [ 1848.102457][T10724] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1848.117252][T10724] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1848.126146][T10724] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181250fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2100}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1848.248244][T10734] loop5: p1 p3[EZD] p4 [ 1848.260593][T10734] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1848.275065][T10734] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1848.283230][T10734] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181280fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xe80}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:17 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x41e, 0x1, 0x7, 0xb5, 0x2, r0}) 14:50:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x3a00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1848.493178][ T22] audit: type=1326 audit(1596725417.899:34): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10688 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45fb1a code=0x0 [ 1848.587613][T10751] loop4: p1 p3[EZD] p4 [ 1848.594092][T10751] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1848.602687][T10751] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1848.611204][T10751] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 1848.640995][T10750] loop5: p1 p3[EZD] p4 [ 1848.645670][T10750] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1848.654529][T10750] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1848.664074][T10750] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:18 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x41e, 0x1, 0x7, 0xb5, 0x2, r0}) 14:50:18 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fsmount(r4, 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000240)=0x3, 0x4) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000000)={0x9, "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"}) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x88) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x11, 0x2, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r8, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="4400000000e4000f08000000000000000000000200000d", @ANYRES32=r10, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r6, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, r7, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r10}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x101}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x40c0}, 0x20040000) 14:50:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1400}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) fcntl$lock(r2, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x400, 0x6, 0xffffffffffffffff}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x200) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r4, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181480fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x4000}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1848.861920][T10776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58368 sclass=netlink_route_socket pid=10776 comm=syz-executor.0 [ 1848.890214][T10778] loop5: p1 p3[EZD] p4 14:50:18 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x41e, 0x1, 0x7, 0xb5, 0x2, r0}) 14:50:18 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) 14:50:18 executing program 0: syz_read_part_table(0xfffffffffffffffc, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="a2d2c1049320e72e084716db7a66f835cce7164a39acd1bca2e4f4bb74684478a6000c0c8cef3e7c9f48544f7137d9604bf28d35eeee69f09ea7e6504f61d33465963013e627527ed8f95e2fe1f5f8378530420fd749fee15030044d63f8462bdfc82b863f546d1dcaaa0000e46d7f96f9d07635a2cc9671823fa49dbdb7e33222d323e41e3684c02b6754d3a2f80e680a772b1028dc7ed037ca5a4b95c951811560d89201ca4d00005d875397a0d372bb", 0xb1, 0x7fff}]) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = getpgid(r0) sched_getattr(r1, &(0x7f0000000000)={0x38}, 0x38, 0x0) 14:50:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000040)=""/83) 14:50:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201814c0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1848.902494][T10790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58368 sclass=netlink_route_socket pid=10790 comm=syz-executor.0 [ 1848.904813][T10778] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1848.929169][T10778] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1848.939775][T10778] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:18 executing program 0: syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 14:50:18 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x80}) 14:50:18 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000040)=""/83) 14:50:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1849.107287][T10815] loop4: p1 p3[EZD] p4 [ 1849.111888][T10815] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1849.120172][T10815] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1849.129104][T10815] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 1849.159727][T10814] loop5: p1 p3[EZD] p4 [ 1849.164635][T10814] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1849.176491][T10814] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1849.184895][T10814] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) unshare(0x200) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r4, 0x0) clone(0x45010880, 0x0, 0x0, 0x0, 0x0) 14:50:19 executing program 0: syz_read_part_table(0x9, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x5800}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181600fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2900}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x3, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88fb}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x890d}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40) 14:50:19 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c4}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='1\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000428bd7000fedbdf250f0000008870294e2ae179e98794c8f7f7bb62d8d12dfe11e155cd8c837ee9ba13f511371c64a6dc89721df721c154b74622db73af088f1f1b77031848c70f9482af29d187bc63ded90000"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040800) 14:50:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x58000000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:19 executing program 0: r0 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r0, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r1, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000108000000000000000002000000", @ANYRES32=r3, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x2, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r7, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r9, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000a00)={'erspan0\x00', &(0x7f00000009c0)={'ip_vti0\x00', r9, 0x8000, 0x8000, 0x2, 0x5, {{0x6, 0x4, 0x1, 0x8, 0x18, 0x68, 0x0, 0x9, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3c}, {[@end]}}}}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001500)={&(0x7f0000000a40)={0xaac, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x9ac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x894, 0x3, 0x0, 0x1, [{0x56c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x2b1, 0x2, '\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x2b1, 0x2, '\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '[&[-\'%3*/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '%^!)&^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x2b8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x2b1, 0x2, '\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '^#*/[-*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x30, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x2c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '@\xc9\xf5{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0xaac}, 0x1, 0x0, 0x0, 0x4}, 0x50) write$binfmt_aout(r0, &(0x7f0000000000)={{0xcc, 0x5, 0x2, 0x5e, 0x1ee, 0x3, 0xd1, 0xfffffffc}, "83926ec93131b3493885eff33b7dc9a9af9eb2de027ce41ccb0ae2d88f33f6a4708fc2a8a59be987d18478b8b943a7aaa8b70f37595f0338a5055ea8d35a0edeac2014c7beb7f5444deef8f6597b7c89b7c57d28e53d13d82cae55738011fe7dd5977e03a2e06e87cb2d762354c99c7eef9aa3d705ae0a8f5038103c6d223eb0", [[], [], [], [], []]}, 0x5a0) 14:50:19 executing program 4: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0xe40, 0x1c0}]) 14:50:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x11) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000040)=[0xf9]) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181680fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1849.766278][T10835] loop5: p1 p3[EZD] p4 [ 1849.770753][T10835] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1849.788184][T10835] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1849.798091][T10835] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x800e}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2b00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1849.998493][T10865] loop4: p1 p3[EZD] p4 [ 1849.999506][T10867] loop5: p1 p3[EZD] p4 [ 1850.002932][T10865] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1850.007990][T10867] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1850.022810][T10865] loop4: p3 size 1912633223 extends beyond EOD, truncated [ 1850.030694][T10867] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1850.040413][T10867] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:19 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 14:50:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$usbmon(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000002, 0x4011171, r2, 0x80000000) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000000)=0x8) [ 1850.045493][T10865] loop4: p4 size 3657465856 extends beyond EOD, truncated 14:50:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201816c0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:19 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1be}]) 14:50:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="80000000", @ANYRES16=r1, @ANYBLOB="01002dbd7000fcdbdf250100000014000160ff80000000000000000000000000003508000200ffff000008000400e3000100050005000400000005000600f70000001400010000000000000000000000000000000001050006000ecb238ee4c63bef0800000014000100ff020000000000000000000000000001c334be4703d778e994a29ec1661ec2935075bba618c2a078247aa16be70632fa24635ef186d3d86d5a409ed6de9f8954e92ae5"], 0x80}, 0x1, 0x0, 0x0, 0x40101}, 0x4040) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') [ 1850.254176][T10892] loop5: p1 p3[EZD] p4 [ 1850.258761][T10892] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1850.269577][T10892] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1850.277933][T10892] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181740fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:20 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 14:50:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x21, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:20 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETA(r6, 0x5406, &(0x7f0000000080)={0x0, 0xc24b, 0x4, 0x6847, 0x18, "10281303bc1ebdfe"}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) r8 = socket(0x29, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) fchown(r2, r7, r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r0) signalfd4(r0, &(0x7f0000000000)={[0x6]}, 0x8, 0x80000) 14:50:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r6 = getpid() sendmsg$netlink(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x1, r3}], {0x4, 0x4}, [{0x8, 0x5, r5}, {0x8, 0x3, r8}], {0x10, 0x3}, {0x20, 0x1}}, 0x64, 0x2) setns(r1, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000000)) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) epoll_create1(0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[], 0xffffff78) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff78) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f0000000000)="785eae5eba146d05ccb98bb4f7ffed95910d04f8b32d8ab34b59d0b118964ff84fabdeef2e722e1006e879b4863e4711f30a130b7bb4e2056caff3fb84a51bd46c31aa0cb4db29d9752a438b540986a8653a3ceec4e090da3fa49fc3d8374d365a632a33168b7950096e4d3d036e54f7f5d975a3dfa5b17545fad06cd12fe053a68682a3b3bc4781677d4dc89b48bb3afebc69dbbed974af80ec57adcde20d2304f0a3334bebadeb6edf03d4037488a43df6a7a81e2e5a67c8f65a41260036548ad72287d526e8f0ef235afa648978f909102b0a71b94656a38b4aa5567ec6fcefd2a004486aeeaba8d4a218a53be12ead4103", 0xf3, 0x5}, {&(0x7f00000001c0)="b3062936639badd75c9d6e0ddbe201e090168051a83469bfa364821f28e3bdf6b96b1b4c9b61f496287bad1a6ae4ca99aadcd27878849eb5674d76bba8bb50866e6ae608f6", 0x45, 0xfffffffffffff612}]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x6e, 0x84, &(0x7f0000000100)="3930bb3dbf5c77b90aab4eea1bbcb6c4eb9dc1e70a9f632fc03d72870c0416543599c303b3ee57716743643f858cb5c642055efa5f0cccd1c70ef92ac447984280a865931abb4acd256efc29841705284fda53f056e79131ddb8ff68c9b7cc7090b2bfb134d4f51c6c9a450a177e", &(0x7f00000002c0)=""/132, 0x4b, 0x0, 0x99, 0xec, &(0x7f0000000380)="e163395fafcef47a77a600c4b8cd60588b4fe777a15897f9eacc7272062ae7303e244cadcad0ab487383498e2492ed064c7afae0a13be8117041f7e2b1cc4c6ee720183d2bffdb53b8b4a484239e5114d68ea3a07acc3c2cffec7d2ed1e38c954fa9d2efd53596429dca0a732047a972a6f29c9a8c66e59f5dd4d1d8df8df490c18d84053230823c46b69cde6fe349ca03b84f525b21004735", &(0x7f0000000440)="e72b04637bff02b10caf1497b6dccbb7cd7435a9b7270d4b4c27483fadce7e67d05dde163660c32aa78a3274af6baf3b35a647f251857ecece41a8bae55358fb4b250dca0ebf01bb653b83b3048707e260e13a4b063c6c380bc36569286390da866b62666bb2db465ecd210ac4dea22f8b4deaeee7aaff821beacdb1e45364da38684e4caf391cca84c55d889c1e185e20f299c6341227c0366f0da2ef1ca177e88c5be4608da1fa16f5c6c034f8171dcba1bc70c9e284a1b62509eb7ec2255dcb7941dc5e7be5226676bb0ecc0435e71c7c8c6138684f0ed103e3d846d39e88d6019aef25ac1cd2fd2813bc"}, 0x40) 14:50:20 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./control\x00', 0xa4000dda) fchmod(r0, 0x9) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r6 = getpid() sendmsg$netlink(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x1, r3}], {0x4, 0x4}, [{0x8, 0x5, r5}, {0x8, 0x3, r8}], {0x10, 0x3}, {0x20, 0x1}}, 0x64, 0x2) setns(r1, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1850.796418][T10919] loop5: p1 p3[EZD] p4 [ 1850.800841][T10919] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1850.816874][T10919] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1850.834994][T10919] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201817a0fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r6 = getpid() sendmsg$netlink(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x1, r3}], {0x4, 0x4}, [{0x8, 0x5, r5}, {0x8, 0x3, r8}], {0x10, 0x3}, {0x20, 0x1}}, 0x64, 0x2) setns(r1, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="027b81000fff0a000000ff45ac0000ff01fb000080170003550000000a0000000081ff0000000000000028c5b69b04cddbc888090c8f", 0x36, 0x1}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x2, {0x9, 0x0, 0x800000, 0x2}}, 0x20) 14:50:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r6 = getpid() sendmsg$netlink(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x1, r3}], {0x4, 0x4}, [{0x8, 0x5, r5}, {0x8, 0x3, r8}], {0x10, 0x3}, {0x20, 0x1}}, 0x64, 0x2) setns(r1, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x1, r2}], {0x4, 0x4}, [{0x8, 0x5, r4}, {0x8, 0x3, r7}], {0x10, 0x3}, {0x20, 0x1}}, 0x64, 0x2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000013c0)={'broute\x00'}, &(0x7f0000000080)=0x78) syz_read_part_table(0x0, 0x4, &(0x7f00000000c0)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}, {&(0x7f00000001c0)="8cb6711aea00d31261120acbeefa6eb39d516e025a0064e1ce7c4a935dfe61788acf7ca2980f08bb21f553ae6792b75a7d094296672efd5a4c4a0823b3d7fe2a0f90ea7db0248c1de91ac9c50cc8e23e38a3deec19688a5338327e00471b8c1ad9041abf5cd24de33ee1db4cf7e35a71f688191c3afcf038c3ed42d9cbf397becd7e6c1482665f212f7a860d9cc8683e7e0f0a290a20326519146e6c159a045d77dc6e44f3f2424e000ea68e4a73013d93e37d0cfb68f5537f3e4811485af54a7aebf73f949b5fa99645ef9233cf682d9db7511d6bd5", 0xd6, 0x3ed5}, {&(0x7f00000002c0)="2d8ce6341878d1fe61bcb570461ae89eab1fb9bc3852ba20251279a60e547ced1ceacc487d7db364530f7af5f853955a61074a673ae08cdc9ef18ff42eeec73f6172f64079f39bc093b8445481c746aa8b047a1eb7e7207f23f94b5213c3e34f55846431ab17d3984057f10f5359dd5ea16a327ccfeb6db3af9e206c3036cdca0ef7b8a6641f1b2aefef7e27435c560c66705d7c2b3199992bfa4f23d29be0ebbdebbe3ef6cf5a9ec06f37aa09706de3befdb77e73107fcb78290f854968ab798f59f83dc1b043a10042e6101ac48ffa603d0ff63e6363ad7d5851f42e71bc", 0xdf, 0x1d8}, {&(0x7f00000003c0)="72d29396a4f0f33f0a73832dd784502656f7e53f0557c9cc3ce916b63f8f3c729f4cbe73d68d032ef5dd3cd868791701108079048355135f89101e61fc83547504f214633fbef57c2b330d99943ff745e6838a7b881d643beaf236387cd3bb600be40f7b5ecbb1fef4323a90ebd7a703871dc8c1dc49c7d3669b00e1b607e0481dc4733fd3bcce1f1c0de20e7d5f2b098ccef3b02ae594cfbc553250e24c7fbe7a8c1bdae3d41e391051b90b46ed9775834d7d89bce6258909096d85e6538fedda61e1da2d19e92e5452ed3b501ba4a7e3230ea93380fece3caddc0b91f99a943e36d86787a04e587c7261c715e87520008a029d349d94141f9ae24321a14589c950344f9f6844f721065d0c8fd66627f03dc52a55726f60548cd9e24f07fed733f2c04d7d8367d4f64609481b58a3aadfb4e6c3d04e697147d3cf7e276987be8f5af47b411739906b857913b57bc19c864d4d0aaebaaaedbcbfce6c432b85e7d81953f3a926d4b65855c70dc8da40cc79f8a9bf4e3df83ee4284bb261e93864b9f764e3a97bf4e68c23d4529cd62df3c1c3d2c7bbc1d9b9ec658b5fc2e1b23b8482c7474585479b1a239013ddbeea714d6fba0aa12235913051cbaca606814fb9d8ce44cf66722a0327c054a5667688382d74a4bd7c6e6e9285fe040ee95bfc99f376688692216900b87dc77845a938b5aa660e3552ae461022d781e240d8659e28cd5ef3410404729bc513dcbbcd3fd8ec23d0308b2630b65ffc2d662e96d55f9a47369838306c18d200ea621a8028e7b93b28f9f713c0cd3308ba8cbd59e691f0cfab52cbaea7813d1132e2d4e6e00f848966371f1b04f188db8c8d9992346e1ae4f1faa2f9b4603feda6f09352dbdebd58584a72f3109f6f0c069c044ddf18376c804c526ced1b2001b42c79eb49e433fbe739bcda7ef6ab84d0d5f04b31e6d5271286b03d04edf9ff1f9fba2799be0ffd5064aac0318d515b0de6981ff5555deb19d5532129c46ae2b6834d0a086d8299ab8e963ad8c50309765c86ae934cac6c48618c9c8b7b75947c6439f3e8ca8ca4a14e1a62ddbe33085f14f80424c4d1854ae2548bbf97c92d1d6e7ab55bb21cb1894419ca0e0ddf20ab666ba9a7a0b9c750e91ab97a83a39a4d480bd67af86d437bb696076d19f4dd92e3fcafbe5ebf21c3c947508f332efb1da201de5970938d0349e6e0ce41638133d4275eb03043d428ce7b173d0a4f946b62f3c182723445396369024d413a223cadef6b86ce9e0bd6dbb147e957a9b8285f40af2d94fffb3dceb6c3b3c1ea9f281db3377ba3d8ae3dff724d460370be394c978dd27f33e0d6cd309ef9c4bc66424b24a1ffb21102a67638601987555e24e7266498eefe1c3956cd9206520f1d43a0bcb1c400d1654226827dc6fb9956a64d897970571f7427093a4688f006d4565d1775776a92d3ea2695b57d014e46e51eff6952947fdb276d17e5bb116376d424efca6f33816081f0b743ce36cd34c611dcf4e2d5155e84cd58884c0081a8a837a4076f6e6fd6ca0ed8ff072596bc56d78d346469c4cd5615788e60b20aafde5d7b677c823ef181454eea526906775eefa167369d531404b4f4accd9c077cfb9af9c9201db96bdd7294d51a1f412484572d17523f0ac704ceef71141d5f6344e6b926401d63aa4d087d5d45f1d31d82fd049346ff2c3fe65c1b763ecedffc4cd3decbfced6324da78c6e5ff39b16257d59e0080bd0a694c196949ff88935cfa2935067dd05b7f698bc3bbad2753c449bd8c0596f7fcb99fff01017471806a2c9799bb60467f32fad8463f3382ef26731185b0338668e23794e6c643ce5d5b2d7e3ef5beaf7f99b07b8e41aa26f319f9222ff838f1cc2cee172b8f09d23f44914dc070418e415dbf1169e304c194fe0de22a8dd2fb131024e470b5be3b2ef6d14edcb1f935ee0eafaba038262ae0281e5912d6199933c8369b0f5cf8328ab2ddca984908f064a4fd1e6e6e2f713655c5067074c18d603521747901ef0ffdd4088006ec761160cd914c1e7fa442197c0546c41297d4ab67f434e84b9ea97207f1aa5bb4c48ad4550d627358818e634a5e3f94613d30339c87447b1426395bee10474124ce1ec8e145fd6153a0a840bcbc3bd9629b7dcb984d1f4f767d98c67ce1fdf407a96fa639b8114c4804e430bab6c3246b3a932655ff2a764004efe8317298b2856244890f5970f4ff4d992d814354e3d6e3bdccb9f07e0d9494b94437bab6d3f3f80a570f537195f18ba328e5911ac730c760026966fa57f2d30b96eb5c2457a2f864cffd37b99aedb70c811415d0b72e457910167cc7915c4a89a0b44d0e24810a9bf9b4b9eddede92c66751c4babe7a1e1d4fe97155a7ba6eb119df8c690edfe231632b43f973812786cc53ac95b56a553bdfb7e20ada7f32aff2f8d980ad4195d5c62dac421f3bb5a520d1f692129252179ed80a020e41f4890a5fe45808b47ef79b100f1c199534675edf453e5f9363d8e6cdaf346f7571ff0b85a275621980fe2719a1ca7c956851b5497ae6903b06d6ae8c96d3888b17e3e07c8d958f20599eb701cdc6107579b5524007119832436daed529c3b9f388e1f528aa795b60a73f3c3544b339babbe77e8df446bc6aebf4c3f60f557209630b0d557d2ad627774693fc41ad3a8a74c33109fce1d48b29604707911d80debc1468af9353c576ddc512c1910a093b833da29ad77d065c73d6c7e8cce47de8b0d20af89f842a0009607b0ffbdb39ab7b03af26c1b7f6e0dbf6428810b4af31bc567c9da28847aea0444a8f62834300a912d81052ec57c7dac89efcc8bc9e176e3f57fe9b8fdb1a83b6bc9cf778713db22bdfcf6655ccca42df2cbd84881d09a5323b67604b2ad5a5c4a57719cdb413b88b7c11cb6688f9ee2c661c4e8a161b3eda58a7f4d59b55c5db2cbcee092c09197a2e3fbc21f6cd518c3b3f4548db36aed4a36287493566510c4ef3d38a165a9cc99db26383dcf6dd73d88a54942ab75382645f8ae94e65da912e7c075c9d77ed94c5c419a19611ba9d9b9227b7ed3e7a5df5a4a2af6737d0b26fa077861dce77e995ac03762aa934a97e023f9e9e9df5c7745d50aa70ff66cae61b5a61d6088cd8b89b1366b5f1610bc9e20a52cd0cb611ef0b4b1959ee44aaf37941aaa2663e3e6b926d5ab68d27b15ac657f3e08d894ac7251f766d6162d47d57eaa79a31ddd5911bb95a0afa38d2a02ef19e32e0eecb0a6b397434affca50b70b7f80a458f7285e7fc15b68010847c8882f34ce6c3aa83569278a81dcfb459125e6dc6cbc15fab4f3a0668ed6c64b436bffc4b209324d91397c5d675c4ec9d4a5b5fde0f9e0db4e9a1e6dc993f38d9fd2842ff885aa74e4027c59d5cf5058c7955d129920809cbde461b24553c881dc4508fe8b45bcd105359a8c1efaf729e6959372c67f4cc9dfcb53ae2aaa57e8799643179a6af6d1140255ed7d2e871dfc3b679595a85735569a40c155cf42ac1f570cc6b3914992e35c6e98d2c38f4080a8f44dd41d0e81bebed20a4824f8bb28596c2885f7aa6edfee533d094523a72ecd0602f63ca2ce49ea325d2e1382abc4a3b68904a03e8ce30a0e45a135ab4e19b092a4aaee49ef2cb23305410a53e2e1b24672ac69b0c0f287044c456c45b14df0cc5f3f6f99bbbd542ea4082e66db122cffd85340a195e47df1521eca42900abae303afd4b72f34068648f1855f1aa22d379688441da741434cbbc825ee4b0f2cbdd56b713d6b91aa7b0be8b895b21da046bed686d61b0c0b4e170ea3068450cce7c99012f890ccd755075127ceab2e3b2346edb3b982f2546eba133b6f4715a237b8c16704d1f75c40155b445c0fb3357e031acdce9d2e052f372efed22a6c9520e4458cdda5e47d65cfa48c9d38630c27d83579fc58cbd9b54577434bf2c2a0bb49000481053f17410dc053ed13db28a6ffe242b3f893549132539ac1e4616ac11711c23bc83e19655d5bb1e2396eceed73700c0d3a93de57c1e99bb99b76fc5c7cd6805069e7d8226d1ec071f216bd3ec527c40c1c1da4cb04ba25763c49cc96a2e630a9c3518a1e91059be4457f24ae11129c856de2cb49d138cbe6062611addbef8f6c7c27129ea4ccd07da6d32e517c31962972c4c934fcd8e40e36e8048ca36afc819b1eac61ccedd4ee49e0408199d2d26099ca4924bc63aff19350e4391440ce8ef81d00b2284e06c90f19a9d2303e6bebe8d473a625e4abad23a5105817339b5a8c819fc7748ae770be6f6593ac39f26de2db7ef984caaba683de068eee477243cc242f87dfefdf3bc58905b855a3f6d5a5078504be2c4761d94f32ce3c9839780a82e415e6f19636d14b6e3174b85b651f149cb24820eaf272e2530cb1807e9dcbf965d8aff6e256d1e4e324e26480ff30484b153bb24267a0bf2cb02501ca8256064ff1e9183cd13ad000459b4324bd8cdd5fcfcfd6a0da0e0601c9490f5c7bb22015c09adb9caec7b87c844a45a0406ef32b5ed4111281bb979f7d90dbdb51d6d6f36d3d2b4fbf1053d7dcdff41c827619100e70873074e8f4d354316e9a01a49050822631b2baa3b0888ab1586e65d04b59cc7a5e2c51c82bd77f3db17bd77d934f8f9ede7a5dcad3ebcf3e9e19b66687cfa6c617816bd17b473f33cf22833aca20865aac8956d4cef14d6ca1f105361082d99b1b5f165177c0be89bcb8c8dd0147aa50028857251ecd35d90a66d6a61fa21b34e5d3b093766c52770185f1499c8a6c56d4be13657f0a2b423b8cd769a5aeab5fe332d52972903c24e6f5862e479958d58f9f5632d9661ca267c5b325aaa7825583da2132a59117576d8eeceb9642bd2b81b8da48cce37549450c971f8077e7ba36952825c414e96ada960a284725987d9493049868c664a554e7f76f7b91f81752917c08dcfa7ac3009ddfd3f037a1041c7b75e40da2e466cdf3f7e47fea21cae227c8d0c56e546a30c4ea8ce2da0e894acbd324e68d43b0d3daeeac36c83c5872ecb145cf609f3a2b2fa4d502f99c94aaf5db5c120ce102062fbc5d83eeece9faae2ca7b8f8059e2b30f91236d2bb2791d45e3ffb49f0fce598a19d50a76d9efbbfbbfc3576d4797464e35835d716a62c668220090a088c696f78dcc8960f27027b41e16bfde862c47f48fb892d7e9b2f2f086e2f3af5e02bccaa8db35c57852ce178956597a2b4dbefc04619b09e83ebbabb7c90d715cfb2c2adf188488ade06743bbc9bd9a505c7e2c880756917deac9d771d18e9074debc9d652735c514ab00c33c3c528eb766fe73e0dbf7d8b105423dc5c091295cde7ce1abd23bff777b4f6898bf5d6ebf3c349a617fa40850d6780ef814d59b8aa0a8123edb841be1f9bcc776ac4641e2f9c25a1b59f93f5679831fd051d9c308346ad95bde5117a23c51feec03f663e4f9c07c45cae06051eacb541dd2033a96dfc9101347bf35d0943f39c8a076a77a268cd1634ecd0464c19597a8fe804a572832acb7b17dcad3e279837fd77384dc7befcaa330d4ee0bbb0595000e2b96a9a63c9a5697e62c889fa3570702eedb4a298f499abd56dac6a0d74068752ab70ad1bb285efe834f57457ac5e31d8f35e1755b40c4a8bf4af5f8c19e9aab6c72bd0829f4c7e2f20b90b1171b6e9bd451dee4371f81debcc21d0ea163f1d39e1cb533c231cd8a531c30efa855671ed2079f35cd4a9b0ffd0db79308f4f566f7b2030f05a59368fd1fabb929fb6b39636b4833014a97b0340bf52a2a064e0312919731783952d4797bb57f9144", 0x1000}]) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x40) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/sctp\x00') fchdir(r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x800) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 1851.001637][T10955] loop5: p1 p3[EZD] p4 [ 1851.010051][T10955] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1851.029304][T10955] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1851.038890][T10955] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:21 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) setns(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x1b) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./control\x00', 0xa4000dda) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCL_GETKMSGREDIRECT(r7, 0x541c, &(0x7f0000000000)) dup2(r4, r2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000080)=@usbdevfs_driver={0x10001, 0x1, &(0x7f0000000000)="977dbbb1fbc0c34016e261661feb7ef06e1b056aa086966fe4d2bea09930c8b0548d9552aee820a2139d507866f7df196ed2312aafd06015fc96454c9177433262fcd67b82b211a3a6fd5bdf297f97f2e224660dbe529d"}) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810011ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x3c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) socket(0x10, 0x2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1851.652058][T10984] loop5: p1 p3[EZD] p4 [ 1851.657068][T10984] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1851.681133][T10984] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1851.692236][T10984] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810012ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r5 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r4}}}], 0x20}, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000080)=0xc) getpid() clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ns/mnt\x00', r1}, 0x10) r5 = dup2(r4, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000080)=0xc) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x4000}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r3, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x11}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1851.898037][T11009] loop5: p1 p3[EZD] p4 [ 1851.902450][T11009] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1851.930350][T11009] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1851.963380][T11009] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810020ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x5800}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1852.206589][T11048] loop5: p1 p3[EZD] p4 [ 1852.211017][T11048] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1852.232073][T11048] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1852.263692][T11048] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x21}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810040ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x200]}, &(0x7f0000000040), 0x8) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) syz_io_uring_complete(r1) r2 = syz_io_uring_complete(r1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x296a, 0x80000000, 0x0, 0x7, 0x8, "293e95d3f8a081fdf78feafd9ef7f356e7c460"}) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_LSEEK(r5, &(0x7f0000000280)={0x18, 0xffffffffffffffda, 0x7, {0xfffffffffffffffb}}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r6) sendmsg$AUDIT_USER_AVC(r6, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x453, 0x800, 0x70bd2b, 0x25dfdbff, "2f2bfcf90f427145d31f21a4005348be4d753efa9d8418f314f0f89d2633fbf64bb5769bd54aeb5cce375a1fccb3894c3c", [""]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x40800) setns(r2, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80000) clone(0x3c824000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x800e}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x202000, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='\\.\x00', &(0x7f0000000080)='\x00', 0x0) syz_read_part_table(0x4000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000000)={0x7ff, 0x6, 0x3, 0x1, 0x7, 0x6d3300}) 14:50:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) setns(r1, 0x40000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open_tree(r5, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1852.847062][T11076] loop5: p1 p3[EZD] p4 [ 1852.861645][T11076] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:22 executing program 0: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000001500), 0x800) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000001540)={'mangle\x00'}, &(0x7f00000015c0)=0x54) syz_read_part_table(0x80000008, 0x2, &(0x7f0000000100)=[{&(0x7f0000000140)="7a63d071fc0e33c507609026d5993214ec11677b36e2e08bc9dfe06c5a0dc47648d0f4cafbd306fd5a437df87e06c5e3030500000004300dda04e693b0c2187a9347fd956b216cdc445b17c31f8c40e2c80d6ec7ab251bbf5f21743a34db704463074b8ab1c9a3c9854446a2f00963cbde6f38b799d1566a338415e9b1f6b67a57080012a0a157c66768c53d2a802e6aba2d045e10f4d5f550b2293b4c57b7f1afb0bd01ed0385105f3981fed0fd3794b64fa2b02e055d686afaee5bfd49d8d2db7344f2125181448a9a5d4e09ed00"/216, 0xd8, 0x800006}, {&(0x7f0000000240)="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", 0x180, 0xfffffffffffffffd}]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) splice(r3, &(0x7f0000000080)=0x6, r1, &(0x7f00000000c0)=0x4, 0xd2b, 0x2) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c, 0x800) [ 1852.895656][T11076] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1852.919775][T11076] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3a}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setuid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000000)=""/28) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 14:50:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="02018107a6ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r4, 0x700f) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) getpgid(r1) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000280)=0x5) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3ceb0000", @ANYRES16=r1, @ANYBLOB="010026bd7000fcdbdf250400000014000300200100000000000000000000000000011400020020010000000000000000000000000002"], 0x3c}, 0x1, 0x0, 0x0, 0x40891}, 0x48000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000000)=0x100000, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000040)=0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x7ff}]) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1853.116956][T11119] loop5: p1 p3[EZD] p4 [ 1853.123040][T11119] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1853.137758][T11119] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1853.157267][T11119] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:22 executing program 0: syz_read_part_table(0x100000000000000, 0x0, &(0x7f0000000140)) 14:50:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x58}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) vmsplice(r0, &(0x7f00000005c0)=[{&(0x7f0000000600)="426ac2876c9525a739fd3fdd8e37222bfe334ec16eb09f5485ee115a9bf263b145115b587741ef85b4b6abf21e425aac52fb6e13997b3383b8a81615f4e5ed15584906543ed854eac5c753a920673df5ee642e6b23d42291a88df8621a38855b75a0d3b85d1877dbdff7fb7b82ab41a83790e6b01da3687a922d80bb247b0a", 0xffffffffffffff5e}], 0x1, 0x6) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./control\x00', 0xa4000dda) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000140)={r3, 0x6, 0x7ff, 0xfffffffffffffff7}) bind$netlink(r4, &(0x7f0000000540)={0x10, 0x0, 0x6, 0x80000000}, 0xc) syz_read_part_table(0x0, 0x8, &(0x7f0000000480)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1be}, {&(0x7f0000000000)="d0502123c61df822ae8bacf14ccbf0ba4cf4f3b61cdd65cd72f309f680d2cc07329325ae939738942e3e09fa5857980c6fc97bcf7b3dc04a845b7d1f5af0e5b5df333aa8cad235694a8a8af7de2aa753", 0x50, 0xffffffffffffff05}, {&(0x7f0000000080)="e516f6218478814f186c3be47fb0fd23058f70341971768e6a85caf5f7f7b8400ce6c01c1dd9780f569d0aeff1d5138f14ff1fee2ea7ed7b0921ad174c58587007c864e981108447a88180f6baf029e66b379beade762955893cbc83f5753cf180165776830cc313bc06cb95cbfd68724f2d8b586560848a5378c9ae59de76604a30a72adc872536ee447058ff209a46a9216e3eb5fca20a6821", 0x9a, 0x8}, {&(0x7f00000001c0)="81a202ee4f9ce3edfb61ca0283cc6256ce0b0490dd4ba5fe0b8a1815179b4cac4fe7deaf0ae345996a461d020459962a50250eb13e261bae853c3380eb10009e019c3ba5321fd9eff73cb2b94bdefca4e78a8def3073b908f34386fccd13538bce0fac0b4b4a303fab59e2f8d4c0cb10a943c00b8e28ff77267fab4a6766abd6", 0x80, 0x1}, {&(0x7f0000000240)="cf49d165b622c7544b6eab451763c09a63e7a775802c01a5c7c57a76b1550c4871694711fd3a5dbba11bf3b4", 0x2c, 0x1}, {&(0x7f0000000280)="91776d72a93ee3a8c680766d3b77e1dfa40eac0ac96e6d521f4aa53a965f86dca4ca55672ea1f063fce7b7f511d318f805116ae7ec869c261498c365c8dd824366e4d0261457af4c914d1f68b48769cc85d0e6d4429ee01bd0145312a27eb139365b4f71b4891a3b21b01d", 0x6b, 0x4b}, {&(0x7f0000000300)="247489c8f42a23651b33c09af55f6ff393c8470ff51a18edad78644726faf8265422e87ca783026042e6603e216073a975f3327364dec08094ddcf113ca8ab59bf44d799ff6758403de65c89beb06bc7cac2907c0fc73e224dad0abeb74078a56fa52f1d554cbc35affc4b8692af3a7d4473a55e91fbf696fb422ebadddfcbb78b9ca5f022c9693b872ad5af425529d443d1983d772c3f602d6b197deb4274907739ae17c237f704d8c042d7d69bc6ec16b02f896ff8c3b590346a76ce79dde47b2ec0df91a4d532fe33812f455d69daefb5ea86a7", 0xd5, 0x2}, {&(0x7f0000000400)="fd560eb6914cf29a2b077675f2f044ecc2fa0cd85559f6569fddd867cea849470434c4c1c1e21573a18234a8cc6fc551c11cf57420551cb4a57b4f595360a4189a16f9b69db53685c5f1bd2255ce312e0ac64a28a7d5c4eb6af620e64d3e482b40a42cd60043fe37044229667f9f68e7275343f7050f2cb649", 0x79, 0x4}]) 14:50:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000000)) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="02018107c8ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x600}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r3, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88000}, 0x48000) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r4, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4054}, 0x40000) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 14:50:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 0: syz_read_part_table(0x1, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="2b5695392224747b1dcefff4ca26a55eb022ad4ce87594fe3e9960b0fd73b6f9ac03e702e4a42641d16a52e7774fbf81168a4b76030000008c2c623b44a6935c14a3045ce45b651741dd98651085680b2b699151ba0bdf4d24164ec783c6143c3233e239022d6a62bef2c342c4bcd1d1fea1ddc60394252cc640b388b9f857e1a05a136c6206a3430d82a569d128b9fcfd9a25fd", 0x94, 0x10000}]) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0xf, 0x0, 0x0, {{}, {0x0, 0x4108}}}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40805) 14:50:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000080)) syz_read_part_table(0x10000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1853.929915][T11169] loop5: p1 p3[EZD] p4 [ 1853.935062][T11169] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1853.949812][T11169] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1853.958418][T11169] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:24 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="f3b744dd3acb60d16e30f0b6a7c1dd1db467091e6341b548eb89a43b62806bc8590e5766692ce9e6a38fed9e6f94a20e045e97c4af982150b9daec12af9ece1c337fc10b185067159b6530f72a287d1ab1b54d18b49a0f57c59dcaf57c9a8c9879de78381fd90940185d2330ee2c2a95bd7ea2ee961e", 0x76, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8b2b099bc7b2ac1c16fce2e1583d37e717750d2f30be91", 0x17}, {&(0x7f0000000040)="c6d482b237e4307abc72bcc0f1c3b153f0d42b7ae99c01da3dd637a4fcf4967d883cc5e626418a73660bfdfe8173ab3175ff2b70311b1b0937110175982e22526c1344e92cd4174b6a5488317a5ccfa68a9c7764aecd3c41858698f30eab", 0x5e}, {&(0x7f00000001c0)="59d657ba79e3adb435ba9b270a94c9f1aa151c30b815d3654700fde08817a86dc3b231eebca107145a96d56d43437b14774d0faca6d235b8101aca3692360c2febf1086a46d21e2f287af4c8291580bc516c681c3e590799ffd570811912327fede9b59b3b6cb9b9b03c918a8f3d724d9e025609ddba1f5b3f56ffe7f4769f63d2122b123d3000ec12464ffd864f65f05201556d80dd0b4bfa71931a2cb460748b94b1450165cb96fa70a8e1e927d9eef453d4e32e548604161ea4e5", 0xbc}], 0x67, r1) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x74, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x1a}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0x29}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010101}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'hsr0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x4010}, 0x1) 14:50:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="02018107cdff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xd00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x4}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) sendmsg$OSF_MSG_REMOVE(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x1060, 0x1, 0x5, 0x201, 0x0, 0x0, {0x3, 0x0, 0x6}, [{{0x254, 0x1, {{0x1, 0x7}, 0x6, 0x2, 0x2, 0x1ff, 0x27, 'syz1\x00', "cfd99cf4ac220cf99e90b7cf8f724870d9d98f2027871989f47dca4503131b18", "221e1267318073a6407911c044960a83855225726fa65312a9dff9a987e0dc0c", [{0x401, 0x5, {0x0, 0x7}}, {0x1ff, 0x101, {0x3, 0x800000}}, {0x4, 0x6, {0x3}}, {0x1ff, 0x6, {0x1, 0x3ff}}, {0xf2, 0xfa36, {0x2, 0x7}}, {0x2, 0x401, {0x1, 0x80}}, {0x757, 0x7fff, {0x0, 0x7}}, {0xaf, 0x7, {0x2, 0xff}}, {0x4, 0x4, {0x1, 0x932d}}, {0x5, 0x5, {0x3, 0x80000001}}, {0xffff, 0x7, {0x3, 0x8000}}, {0x8, 0x1, {0x1, 0x80}}, {0x1, 0xfff, {0x1, 0x3ff}}, {0x1, 0x7, {0x2, 0xc6}}, {0xffff, 0x5, {0x0, 0x6}}, {0x1, 0x9, {0x3, 0x5}}, {0x7, 0x843f, {0x1, 0x3}}, {0x7fff, 0x1, {0x1, 0x10001}}, {0x9, 0xff, {0x4, 0x1}}, {0xf8, 0x0, {0x2, 0xfffffffc}}, {0x8, 0x4, {0x0, 0x4}}, {0x7, 0xff80, {0x0, 0xfffffb71}}, {0x6, 0x8, {0x1, 0x8}}, {0xbf6, 0x6, {0x3, 0xef}}, {0x35, 0x1, {0x0, 0x3}}, {0x0, 0xa8, {0x2, 0x8}}, {0x80, 0x6, {0x1, 0x84cc}}, {0x5, 0x5, {0x0, 0x53a}}, {0x1, 0x2, {0x3, 0x4}}, {0x2, 0xfffa, {0x2, 0x3}}, {0x2, 0x0, {0x0, 0x9}}, {0xfffe, 0x741a, {0x3, 0xffff}}, {0x0, 0x800, {0x1}}, {0x8001, 0x4, {0x0, 0x3ff}}, {0x1, 0x6, {0x2, 0x8}}, {0x4, 0x9, {0x0, 0xaff}}, {0x200, 0x101, {0x3, 0xc3e}}, {0x1, 0x6, {0x3, 0x400}}, {0xfff8, 0x8000, {0x1, 0x6}}, {0xfff, 0x1000, {0x1, 0x1ff}}]}}}, {{0x254, 0x1, {{0x0, 0xcc}, 0x8, 0x3, 0x9, 0xffff, 0x1d, 'syz1\x00', "cf033ee31bf14eb0b9ea0da648d8f070b6c72fdf3ca12585f95438a19e145ebc", "0cef38c707853d1c4945cb05d11646bf1b57d08b546c0a6de1dbd9e4016c4094", [{0x7, 0xc8f6, {0x2, 0x8000}}, {0x5, 0x7e, {0x2}}, {0xb56, 0x9, {0x1, 0x2}}, {0x7, 0x3ff, {0x0, 0x100}}, {0x0, 0x4, {0x2, 0xe99}}, {0x40, 0x2, {0x3, 0x9}}, {0x7fff, 0x800, {0x1, 0x6}}, {0x0, 0x1, {0x79f9667b51ba560b, 0x9}}, {0x4, 0x7, {0x2, 0x6}}, {0xc70, 0x3, {0x3, 0xad}}, {0x3ff, 0x3, {0x1, 0x5}}, {0x800, 0x52e, {0x2, 0x7}}, {0x0, 0x1, {0x0, 0x40}}, {0x100, 0x6, {0x2, 0x4}}, {0x1, 0x0, {0x2, 0x8}}, {0x2a96, 0x5, {0x0, 0x6}}, {0x14, 0xe0, {0x2}}, {0x0, 0x9, {0x1, 0x1000}}, {0x7, 0x8001, {0x0, 0xfffffff7}}, {0x8, 0x3, {0x1, 0x8}}, {0x101, 0xffff, {0x1, 0x6}}, {0x0, 0x1, {0x0, 0xffffffc0}}, {0x4, 0x80, {0x0, 0x8000}}, {0x1, 0xfffd, {0x3, 0x8}}, {0xa0a, 0x8, {0x0, 0x4}}, {0x4, 0x5, {0x1, 0xf4}}, {0x2, 0xff, {0x1, 0xfffffff7}}, {0xfeff, 0x1, {0x0, 0xff}}, {0x7, 0x8000, {0x1, 0x3}}, {0x0, 0x48, {0x1, 0x10000}}, {0xf90, 0xb9de, {0x2, 0x1}}, {0x100, 0x3, {0x0, 0x8000}}, {0x56, 0x8000, {0x2}}, {0x8, 0x0, {0x1, 0x5}}, {0x7ba, 0x3, {0x4, 0x3f}}, {0x6, 0x5, {0x1}}, {0x2, 0xb5, {0x0, 0x1}}, {0x0, 0x0, {0x1, 0x81}}, {0xff, 0x3, {0x1, 0x80000000}}, {0x7, 0x640, {0x0, 0xffffffff}}]}}}, {{0x254, 0x1, {{0x3, 0x3ff}, 0x49, 0x3, 0x400, 0x4, 0x16, 'syz1\x00', "ea851173d38742fe153483e8edad1ad3fd2125d1883afbbc25f11b86a7eccaf4", "bd4d92ef8cf6d416ebcb7980f2af5eccecc0fa4a9ddcb60500894323908ca602", [{0x3, 0x7, {0x3}}, {0x4, 0xfff7, {0x3, 0x7f}}, {0x9, 0x400, {0x3, 0xffff}}, {0x3c7, 0x1, {0x3, 0x7fff}}, {0x1514, 0x30d3, {0x0, 0x7ff}}, {0xffff, 0x7, {0x1, 0x2}}, {0x1, 0x80, {0x0, 0x37c}}, {0x401, 0x6, {0x2, 0xfffffffe}}, {0xa0a, 0x7, {0x1, 0x1}}, {0x401, 0x5, {0x3, 0x6}}, {0x4, 0x1000, {0x0, 0xffffffff}}, {0x9, 0x1, {0x0, 0xff}}, {0xfff, 0x2, {0x3, 0x8}}, {0x100, 0xd7}, {0xf001, 0x5, {0x0, 0x5}}, {0x5, 0x81, {0x1, 0x1}}, {0x3, 0x8, {0x1, 0x2}}, {0x9, 0x7ff, {0x1}}, {0x1f, 0x400, {0x1, 0x8}}, {0x6, 0x8, {0x1, 0x8}}, {0xfff, 0x1, {0x0, 0x5c}}, {0x4ea4, 0x40, {0x1, 0xaa}}, {0x8000, 0x9300, {0x0, 0x6}}, {0x8, 0x8, {0x3, 0x5}}, {0x75e, 0x800, {0x3, 0x800}}, {0x8, 0x6, {0x1}}, {0xf800, 0x8, {0x3, 0x37}}, {0x3ff, 0x3, {0x0, 0x48a}}, {0x6, 0x2a, {0x3, 0x8}}, {0x1, 0x0, {0x1, 0x3}}, {0x1ff, 0x5, {0x1, 0x81}}, {0x2, 0x0, {0x1}}, {0x7, 0x6, {0x3, 0x8ac}}, {0x8, 0xa2, {0x3, 0xff}}, {0x101, 0x8000, {0x0, 0x4}}, {0x2, 0xe3d, {0x0, 0xff}}, {0x3, 0x3ff, {0x3, 0x200}}, {0x1, 0x96, {0x3, 0x9}}, {0x3, 0x2, {0x2, 0x4}}, {0x0, 0xc64d, {0x0, 0x5}}]}}}, {{0x254, 0x1, {{0x2, 0x800}, 0x2, 0x5, 0x1, 0x0, 0x5, 'syz0\x00', "7d6f58fa061c34b388b933d9c9146278b3ac80af1c00cd6e254723a107f55251", "d37ae4467ca344a5a442c6c11bda7a08eb6131c3e36c5b6c95fa138353e1a381", [{0x4, 0x0, {0x2}}, {0x5983, 0x0, {0x3, 0xfffffff8}}, {0x2a4, 0x4, {0x0, 0x8}}, {0x81, 0x3, {0x0, 0x6}}, {0x7fff, 0x0, {0x1, 0x2}}, {0x4, 0x9, {0x3, 0x7fffffff}}, {0xff, 0x9, {0x2, 0x6}}, {0x1f, 0x80, {0x2, 0x3}}, {0x8001, 0x6, {0x3, 0x1000}}, {0x9, 0x8000, {0x3, 0xff}}, {0x101, 0xfc01, {0x3, 0x9}}, {0xffa3, 0x1, {0x1, 0x89d9}}, {0xffff, 0x6, {0x3, 0x67}}, {0x6, 0xfffc, {0x0, 0x10000}}, {0x0, 0xffff, {0x3, 0x1ffc}}, {0xf5, 0x4, {0x3, 0x17}}, {0x39, 0x5, {0x2, 0x4}}, {0x800, 0x3, {0x0, 0x4}}, {0xf8, 0x2, {0x2}}, {0x3, 0x2, {0x0, 0xbc1c}}, {0xbf, 0x1, {0x2, 0x8000}}, {0x4, 0x81, {0x3, 0x4}}, {0x8, 0x7, {0x2, 0x6}}, {0xff, 0xfff, {0x1, 0x8}}, {0x9009, 0x401, {0x0, 0x8}}, {0x6, 0x2, {0x2, 0x2}}, {0x9, 0x3, {0x1, 0xed80}}, {0x2076, 0xc75, {0x2, 0x3}}, {0x7, 0x9, {0x2, 0x2}}, {0xffff, 0x7fff, {0x1, 0x1000}}, {0x14, 0x9e, {0x0, 0x4}}, {0x40, 0x4, {0x3, 0x5}}, {0x9, 0x9, {0x3}}, {0x1, 0x1, {0x1, 0x98}}, {0x5, 0x8001, {0x2, 0x7fe}}, {0x4096, 0x7, {0x3, 0xffff}}, {0x80, 0x5, {0x0, 0x5}}, {0x1, 0x7, {0x1, 0x6}}, {0xfffc, 0x9a, {0x3, 0x63a}}, {0x6, 0xfff8, {0x3, 0x9}}]}}}, {{0x254, 0x1, {{0x1, 0x9}, 0x8, 0x7, 0x80, 0x4180, 0x2, 'syz0\x00', "16ac2f8fba219215aafa170260b91991a4175b25507086ef00f05ab064adecb3", "b3b15bd2f08a6a73991428a4653df29f8e328b4249ac63906194cd502a524bdd", [{0x1f, 0x0, {0x2, 0x100}}, {0xf8, 0x8, {0x0, 0xaa3000}}, {0x0, 0x6, {0x4, 0x3}}, {0x4, 0x8, {0x1, 0x7f}}, {0x7, 0x8001, {0x2, 0xca}}, {0xef28, 0xe46, {0x3, 0x7f}}, {0x1000, 0x3, {0x3, 0xfff}}, {0x20, 0x7, {0x0, 0x9}}, {0x0, 0x101, {0x2, 0x8}}, {0x3ff, 0x0, {0x2, 0xfffffffa}}, {0x2ef8, 0x3, {0x2, 0x61e}}, {0x200, 0x3, {0x2, 0x8}}, {0x5, 0x8, {0x0, 0x1}}, {0x2, 0xdfea, {0x1, 0x1}}, {0x1, 0x6}, {0xc5de, 0x0, {0x2, 0x8}}, {0x6, 0x770, {0x1, 0x8}}, {0x3fc, 0x6, {0x1, 0x1f}}, {0x0, 0x3, {0x1, 0x2}}, {0xb241, 0x1, {0x0, 0x8000}}, {0x1, 0x2, {0x2, 0x4}}, {0xf694, 0x7, {0x3, 0xffff8001}}, {0x9, 0x5, {0x2, 0x2}}, {0xfff, 0x56, {0x1, 0x6}}, {0x8b46, 0x400, {0x1, 0xfffff801}}, {0x15f0, 0xffff, {0x0, 0xffff}}, {0x5, 0xb82, {0x1, 0xa06}}, {0x5, 0x5a, {0x1, 0x6}}, {0x5f9, 0x3, {0x17c2fe77d3fbf978, 0x3}}, {0x8000, 0x8001}, {0x100, 0x49, {0x2, 0x100}}, {0x4, 0x2, {0x2, 0x7}}, {0x1f, 0x4e8d, {0x1}}, {0x8133, 0x6, {0x1, 0x40}}, {0x2, 0x3f, {0x1, 0x1}}, {0x79, 0xfc2f, {0x2, 0x8e2}}, {0x3, 0xce4e, {0x9d303daaef9d4834, 0x5}}, {0x6, 0x4, {0x2, 0x80000001}}, {0x7, 0x6, {0x1, 0x7}}, {0x7a1b, 0x1f, {0x1, 0xd68f}}]}}}, {{0x254, 0x1, {{0x3, 0x8}, 0x40, 0xd1, 0x5, 0xfff9, 0x20, 'syz0\x00', "6e2517a4cf616ee8463e58fd0f25174936d5a0b5d2ec6ee2571f96d7bd55a45e", "c4843dd1c030e8c646bca7bb8caf7ab0c19c92386173bc689e8559e20dd8563a", [{0xffff, 0x1ff, {0x0, 0xf8}}, {0x81, 0x3, {0x3, 0xffffff7f}}, {0x6, 0x1f, {0x1, 0xfffffffa}}, {0x20, 0x4, {0x2, 0x8}}, {0x81, 0x3, {0x2, 0x4}}, {0xff, 0x4, {0x3}}, {0x3, 0x4, {0x2, 0x2}}, {0x7, 0x7, {0x3, 0x7}}, {0xfff, 0x4, {0x1, 0x8c}}, {0xfff7, 0x9, {0x2}}, {0x7f, 0x1000, {0x1}}, {0x401, 0x8548, {0x1, 0x9}}, {0x6, 0x7, {0x3, 0x2}}, {0x0, 0x3, {0x2}}, {0x5, 0x8001, {0x3, 0x7}}, {0x20, 0x5, {0x3, 0x3}}, {0x1, 0x2, {0x1, 0xe2fa}}, {0x8, 0x101, {0x2, 0x7}}, {0x6, 0x401, {0x1, 0x8}}, {0x9, 0x6, {0x0, 0x7}}, {0x7, 0x4, {0x2, 0x80}}, {0x1ff, 0x2, {0x2, 0x6}}, {0x8, 0x7, {0x2, 0x9}}, {0x926, 0x800, {0x2, 0x6}}, {0x7, 0xffff, {0x3, 0x8}}, {0x7, 0x5, {0x2, 0xce}}, {0xd6, 0x1000, {0x3, 0xffffffff}}, {0x800, 0x3f, {0x1, 0x80000001}}, {0xfe00, 0xd6, {0x0, 0x20}}, {0x6, 0x1ffe, {0x1, 0x7fff}}, {0x2, 0xf8, {0x3, 0x4}}, {0xffff, 0x7fff, {0x0, 0x1a}}, {0xffff, 0x9, {0x2, 0x2}}, {0x5, 0x400, {0x0, 0x2}}, {0x4, 0x1, {0x2, 0x200}}, {0x8, 0x1ff, {0x0, 0x1ff}}, {0x1000, 0x46, {0x1, 0x81}}, {0x3, 0x9, {0x3, 0x7}}, {0xd2, 0x9, {0x2, 0x7}}, {0x7fff, 0x5894, {0x0, 0x20}}]}}}, {{0x254, 0x1, {{0x1, 0x4}, 0x1, 0x8, 0x1, 0x9, 0x1, 'syz1\x00', "975c0fab03f3fc8c2d2b566d4e2451b4e8a794d1478cd02b059a885f5f7b282f", "2f53552d25aa986a0448811cd4c22638bfcea216b2047f67d06669c545a954c8", [{0x7, 0x44fe, {0x0, 0xff}}, {0x5, 0x8, {0x1, 0x7}}, {0x7, 0x472, {0x2, 0x1ff}}, {0x6, 0x7fff, {0x2, 0x79}}, {0x4, 0x8000, {0x2, 0x800}}, {0x3, 0x101, {0x2, 0x4}}, {0xfff8, 0x6, {0x1, 0x72f}}, {0x2, 0x7, {0x3, 0x9}}, {0xfff, 0x5, {0x0, 0xf7}}, {0x49ed, 0x81, {0x1, 0x2}}, {0x1f, 0x0, {0x1, 0xfc77}}, {0x2, 0x0, {0x0, 0x800}}, {0x101, 0x2, {0x2, 0x100}}, {0x2, 0x9, {0x1, 0x4}}, {0x1, 0xfffb, {0x3, 0x1000}}, {0xffff, 0x1, {0x1, 0x2}}, {0x401, 0xa4b6, {0x0, 0x8}}, {0x8, 0x5, {0x1, 0xb43}}, {0x2489, 0x8, {0x3, 0x7f}}, {0x9b, 0x478c, {0x2, 0x1f}}, {0x5, 0x2, {0x0, 0x5}}, {0xf5, 0x7, {0x3, 0x10001}}, {0x0, 0x9, {0x2, 0x3ff}}, {0x8, 0x7f, {0x3, 0x6}}, {0x6, 0x3, {0x2, 0x200}}, {0xffe1, 0xfff7, {0x3, 0xfffff801}}, {0x5, 0x2, {0x0, 0x81}}, {0x8, 0xff, {0x0, 0x1}}, {0x1, 0x9, {0x1, 0xf7c}}, {0x6, 0x7ff, {0x3, 0xf7}}, {0x24e6, 0x0, {0x2, 0xffffff7f}}, {0x5, 0x1, {0x3, 0x2}}, {0xde, 0x8, {0x0, 0x1}}, {0x4, 0x3, {0x0, 0x8}}, {0x0, 0x81, {0x1, 0x6}}, {0x7, 0x1000, {0x1, 0x9af}}, {0x40, 0x395, {0x0, 0x9c3}}, {0x1, 0x3, {0x3, 0x1}}, {0x7, 0x5, {0x2, 0x8000}}, {0xa3, 0x3ff, {0x1, 0x9}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x80}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_INTERRUPT(r6, &(0x7f00000000c0)={0x10, 0x0, 0x3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r7, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r8}, 0xc) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)={0xe9f, r8}, 0x8) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60041, 0x118) write$UHID_CREATE2(r3, &(0x7f0000000180)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x46, 0x800, 0x6, 0x100, 0x6, 0xffffffff, "a81b198d9a37f147ec678f44f3c20fe2c7efdc7355c9d79b401cec02f64b2989240b6f9dfbba55c9962d816c58fb50d5afedd050a73889b1ba93b030affb52f0110dab8d7b00"}}, 0x15e) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1854.817136][T11221] loop5: p1 p3[EZD] p4 [ 1854.821551][T11221] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1854.878178][T11221] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1854.907886][T11221] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810002ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x6}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xe80}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fstatfs(r5, &(0x7f0000000000)=""/168) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1855.108321][T11244] loop5: p1 p3[EZD] p4 [ 1855.113291][T11244] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1855.149118][T11244] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1855.170483][T11244] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810003ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1855.253048][ T157] loop5: p1 p3[EZD] p4 [ 1855.261365][ T157] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1855.300365][ T157] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1855.317672][ T157] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xd}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x1100}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1855.541360][T11280] loop5: p1 p3[EZD] p4 [ 1855.545911][T11280] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1855.562993][T11280] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1855.602102][T11280] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x14}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810004ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2100}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:25 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB='\x00'/16], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="50200000914362f6e9a5d0cb6b1427c95fb08a9b5ec12bf5de58aeef", @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf2501000000080001000300000008000200010000000cc00b800500030005000000080002000200000008000200f3ffffff07000200"], 0x3}, 0x1, 0x0, 0x0, 0x8c054}, 0x48080) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x140, r5, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0xf0, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x972d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd704}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xca65a83}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x62394eb5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5c59c968}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9cf}]}, {0x4}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfb87cc6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x34679816}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe94}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x78e4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2007}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33f6cb5d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x20a0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c0541d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4a54}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39075d99}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x546dcc37}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70a2ea6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5782d45f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x354dd7b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x261}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6bea39ff}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf986}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ddffda1}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x743d}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x14, r5, 0x300, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x2044011) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x170, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0xffffffffffffff51, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d89dcd}]}, {0x4}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe6b0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ae434b2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b58}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8000}]}, {0x4}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16a481d2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64e7565e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f158893}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe84}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4899}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x16cb}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xe8, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a2e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x382026da}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xfe00b90}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb931}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5124}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64735517}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x10e5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e365cf9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41c8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc185}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3191}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x592e31f2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x686b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd05c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a741c6b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19bd5945}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x429abd77}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1848}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x38c7e50b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3212}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65153873}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf502}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb970}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9643}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5c3c}]}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4000010}, 0x8001) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x1cc, r5, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x78, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5f5b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9293}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5540b6a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc8f4fce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24303d64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7256cdd4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7dd}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51f4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b7a1098}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe101}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e19acf7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e5e192b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x68f1}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x134, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x985c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5106cc99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1157}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc985}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x760ebe2e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfe5d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6564}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x931e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9002ea8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b952cb7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x695e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c3ad975}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbf7fb10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69794c7a}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x734}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf3ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x49c33d33}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36743e17}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe6f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19d4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf1f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5eaabf0b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4bbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xedb5}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x26df}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdaa9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x172892c4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc159}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4f4a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c029b78}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x68bab006}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7320}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4af3e829}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b9df4e}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x820}, 0x20008060) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, 0x0, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0x7f}}]}, 0x50}, 0x1, 0x0, 0x0, 0x22004000}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x84000, 0x0) 14:50:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="1300e1ff0000043030307342cd1069e53ceb85686ec81841697ae4e0a30653a5bc4eaf9b311f394997c2c8e66034ab55a600fd00dac49c01fb1d09de1599a01762a279161c63a173f1db29f227ccf1e0623e4971a2741f2b10e1980c40dc5dc1c6841ed29026b72aae9f7a13cece070000de78280fa119c0d33a3b53518e082e9bd12c85e92de4584389edb1b3efe1fb07b100000000000000000000009ab4a7ced7a45cdaa17636264c4a59a2fc17defa4fd0c1ccfae6f791f773cb0d686be4777790aaa2db375801b68c9cabb99bd755788177a1c9eb90eeda62055e3f5d19718ca675e0dd4c54b1869eff0f"], 0x13) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) unshare(0x200) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000003c0)={'wg1\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="700000001800200025bd7000fcdbdf250a000009fe00fe01000500000c001680050002004c0000000c00168008000700fbffffff0800170000080000080017008701000014000500fc010000000000000000000000000001080006000800000008000300", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="62272c58bb55f47c3530533ff2d339450517a55432a02ad2dc70a9b14656fb991efe0b166a3c32370a482caaf6fd3ce4307583a46d1a7989d11f1329cdf205b54aa41ad7895bf31e8c6cd0a41419cb033978757319e7648c7f061fe8a45dee92e61ea8bd6586a6fb724e73f19110f6ea2a988a2d084de28e2e4ec7d53dc9e372a8a0e03942b9af8f679e3040d3a467de49d49116c59bad5056eb5a497b9e3b033966f812b7fa8387b181079c513fe43a00"], 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x80) 14:50:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r0, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = accept(r1, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f00000000c0)=0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r3, 0x10, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000000)) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r4, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = fcntl$getown(r1, 0x9) syz_open_procfs(r3, &(0x7f0000000000)='attr\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="020181200fff0a000000ff45ac0000ffffffa500e93119be17f7f76b90679b170003550000000a000000877700720030040081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f00000001c0)=""/86) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x453, 0x4, 0x70bd29, 0x25dfdbfc, "dace32c5a7829957ccfd6aaafae440c856c469d8474ca9404c91d8998d7cb349833c2d7b32da776666bead22ab7abd2e91d49a222c9c30b66e17b09a4361729a30494999d73d9c5c4e60e8b11af06a51696cdfe5fd70601708430983cac35e39b8f7fdadc259d401", ["", "", "", "", ""]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x8081) [ 1856.066310][T11298] loop5: p1 p3[EZD] p4 [ 1856.081337][T11298] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1856.092229][T11298] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1856.106366][T11298] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000000)='mand\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x1c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1856.197362][T11310] print_req_error: 70 callbacks suppressed [ 1856.197369][T11310] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1856.216882][T11319] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1856.216943][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.241101][T11298] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1856.248658][ T89] buffer_io_error: 62 callbacks suppressed [ 1856.248666][ T89] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1856.262940][ T89] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.278504][ T89] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1856.286953][ T89] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.298427][ T89] Buffer I/O error on dev loop5p3, logical block 131968, async page read [ 1856.306934][ T89] blk_update_request: I/O error, dev loop5, sector 263948 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.319755][ T89] Buffer I/O error on dev loop5p3, logical block 131969, async page read [ 1856.328284][ T89] blk_update_request: I/O error, dev loop5, sector 263950 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.339735][ T89] Buffer I/O error on dev loop5p3, logical block 131970, async page read 14:50:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3a00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810005ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:25 executing program 0: prctl$PR_SET_DUMPABLE(0x4, 0x2) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r2, 0x0, 0xf, &(0x7f0000000000)='.[--@$%]\'-\xd5^.^\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) [ 1856.348250][ T89] blk_update_request: I/O error, dev loop5, sector 263952 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.359577][ T89] Buffer I/O error on dev loop5p3, logical block 131971, async page read [ 1856.381102][T11310] blk_update_request: I/O error, dev loop5, sector 263946 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1856.381163][ T115] blk_update_request: I/O error, dev loop5, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1856.405863][ T115] Buffer I/O error on dev loop5p4, logical block 33008, async page read [ 1856.414275][ T115] Buffer I/O error on dev loop5p1, logical block 33008, async page read [ 1856.424052][ T115] Buffer I/O error on dev loop5p3, logical block 131968, async page read [ 1856.432570][ T115] Buffer I/O error on dev loop5p3, logical block 131969, async page read 14:50:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x29}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1856.510816][T11357] loop5: p1 p3[EZD] p4 [ 1856.525361][T11357] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1856.551860][T11357] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1856.569126][T11357] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x4000}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') setns(r2, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000040)={0x6, 0x8, 0x7, 0xe054}, 0x10) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810006ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2b}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x5800}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810007ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1857.019757][T11387] loop5: p1 p3[EZD] p4 [ 1857.024349][T11387] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1857.048669][T11387] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1857.057744][T11387] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:26 executing program 0: syz_read_part_table(0xc2e0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c3}]) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x420480, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x44, r1, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip_vti0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001b80)={&(0x7f0000001a80)={0xc4, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:fixed_disk_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:user_cron_spool_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:setrans_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40054}, 0x20004001) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x8c, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vxcan1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:tun_tap_device_t:s0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x10) 14:50:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1857.266412][T11407] loop5: p1 p3[EZD] p4 [ 1857.270754][T11407] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1857.295514][T11407] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x800e}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1857.312976][T11407] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810008ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1857.541906][T11428] loop5: p1 p3[EZD] p4 [ 1857.557811][T11428] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1857.575711][T11428] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1857.593526][T11428] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810009ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1857.799158][T11446] loop5: p1 p3[EZD] p4 [ 1857.803550][T11446] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1857.819527][T11446] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3c}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1857.848907][T11446] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000aff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x128, r5, 0x5999229e034e5f1a, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x200, r5, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x2}, {0xc, 0x90, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0x81}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x2}, {0xc, 0x90, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}, {0xc, 0x8f, 0x7}, {0xc, 0x90, 0x80000001}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0x9}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0xda9}, {0xc, 0x90, 0x9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x805}, {0xc, 0x90, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc}, {0xc, 0x90, 0x6b786d7c}}]}, 0x200}, 0x1, 0x0, 0x0, 0x50}, 0x8000) [ 1858.089799][T11459] loop5: p1 p3[EZD] p4 [ 1858.094497][T11459] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1858.124008][T11459] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1858.148830][T11459] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000bff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x58}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r3 = dup(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r4, @ANYBLOB="02002dbd7000ffdbdf2507000000088a4018bb00000008000600feffffff7be5dcaaba4cb08c"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000004) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x60, r4, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5f0}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x10}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40054}, 0x24000014) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r2, @ANYBLOB="02002dbd7000ffdbdf2507000000088a4018bb00000008000600feffffff7be5dcaaba4cb08c"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000004) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14f50000", @ANYRES16=r2, @ANYBLOB="100027bd7000ffdbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) unshare(0x200) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffd365a8726a9bd664000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) r1 = socket$inet_icmp(0x2, 0x2, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) utimensat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0xea60}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x4, 0x2, 0x401, 0x1}) 14:50:27 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x2000}, 0x7) 14:50:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HIDIOCGCOLLECTIONINDEX(r2, 0x40184810, &(0x7f0000000000)={0x3, 0xfffffefe, 0x9, 0x10001, 0x80000001, 0x5}) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1858.420550][T11485] loop5: p1 p3[EZD] p4 [ 1858.429325][T11485] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1858.440247][T11485] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1858.458707][T11485] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x600}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000cff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:27 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000a000000877700720030070081ffffff00000000008000da55aa", 0x34, 0x1c0}]) 14:50:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000061111c00000000008510000002000000850000005100000095000000000000009500eed4672f0000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1858.639843][T11526] loop5: p1 p3[EZD] p4 [ 1858.644388][T11526] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1858.652423][T11526] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1858.660409][T11526] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$AUDIT_DEL_RULE(r2, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000180)={0x450, 0x3f4, 0x4, 0x70bd2c, 0x25dfdbfc, {0x6, 0x2, 0x2c, [0x40, 0x7fff, 0x80, 0x9, 0x3f, 0x20, 0x3, 0x0, 0x2, 0x80000001, 0xffff, 0x100, 0x3f, 0x2, 0x7fffffff, 0x3f, 0x101, 0x8b, 0x4, 0xffffffff, 0x2, 0x3, 0x7c, 0x2, 0x3, 0x401, 0x6, 0x1ff, 0x262d, 0x3, 0x6000000, 0x6, 0x10001, 0x80, 0xbc2e, 0x4, 0x537cff31, 0x0, 0xfffffffd, 0x7, 0x6, 0x800, 0x2, 0x4, 0xd9bd, 0x436c, 0x101, 0x9, 0x800, 0x7fffffff, 0x5, 0x2, 0x3f, 0x3, 0xff, 0xffff0001, 0x3, 0xb5f1, 0x80000, 0x3, 0x2, 0x9, 0x8, 0x101], [0x3f0e800, 0x6, 0x2, 0x5, 0x101, 0x9, 0x0, 0x20, 0x25, 0x9, 0x3, 0x3, 0x7, 0x3f, 0xc54, 0x2c6, 0x8, 0x6, 0xf0, 0x80, 0x5, 0x8001, 0x3, 0x1, 0x8, 0x63c, 0x4, 0x2, 0x80000000, 0x401, 0x9, 0x4, 0x401, 0x6, 0xceb0, 0x8, 0x80000000, 0x81, 0xbce4, 0x40, 0xbef, 0x5, 0x8000, 0x2, 0x401, 0x5, 0x8001, 0x7, 0x5, 0x4, 0xfffffffc, 0x8ad, 0xfffffff8, 0x5, 0x7, 0x618, 0x80000000, 0x2, 0x2, 0x9, 0x400, 0x50000000, 0x2, 0x7ff], [0xffffffff, 0x8001, 0x3, 0x7, 0x1, 0x4, 0x8, 0x2, 0x7ff, 0xca, 0x1f, 0x152b, 0xffffffff, 0x400, 0x1, 0xffff, 0x2, 0x5f, 0x40, 0x7ff, 0x10000, 0x60000000, 0x8, 0x9, 0x6, 0x3ff, 0x80, 0x3, 0x4, 0xedb1, 0x2, 0xfffff4b2, 0x3, 0x3, 0x0, 0x6, 0xfffffff8, 0x9, 0x0, 0x8, 0x9, 0x2, 0x4e7, 0x0, 0x9, 0x0, 0x401, 0x10000, 0x9, 0xffff0000, 0x401, 0x8000, 0x0, 0xfff, 0x3, 0xfffffff7, 0x8, 0x51ab5c8b, 0x1000, 0x228e, 0x2, 0x101, 0x2, 0x1], [0x3, 0x800, 0x40, 0x0, 0xa55b, 0x3, 0xf13, 0x1, 0x2, 0x7fffffff, 0x74, 0x4, 0x3c, 0x200, 0x2, 0x800, 0x3, 0xd4c3, 0x2, 0x1, 0x52c, 0x7, 0x8, 0x3c9, 0x8, 0x7fffffff, 0x3, 0x101, 0x9, 0x1, 0x85, 0x5, 0x0, 0x5, 0x40, 0x2, 0x0, 0xfffffe00, 0x8, 0x1, 0x401, 0x7d, 0x7dbf, 0x8, 0x8587, 0x81, 0x8, 0x0, 0x8e, 0x180, 0xffff8001, 0x3aa, 0x4d606fd5, 0x9660, 0x1, 0x2, 0x3, 0xffff, 0x100, 0x0, 0x8000, 0x1ff, 0x8, 0x6], 0x2d, ['fd\x00', '[^%*,\x00', '!\x00', '}\x00', 'ns/mnt\x00', 'H{.\x00', '\xfb]&-$\x00', 'ns/mnt\x00', '\x00', 'ns/mnt\x00']}, ["", "", "", "", "", "", "", "", ""]}, 0x450}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00', r3}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xffffffff) unshare(0x200) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r5, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:28 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) connect$pptp(r2, &(0x7f0000000000)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x32}}}, 0x1e) 14:50:28 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000dff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xd00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:28 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x9}]) mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='efs\x00', 0x1800000, &(0x7f0000000100)='\'\x87\\!\'[\x00') 14:50:28 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$unix(r2, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x102) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}, {0x2, 0x4e22, @empty}, {0x2, 0x4e23, @empty}, 0x10a, 0x0, 0x0, 0x0, 0xff80, &(0x7f0000000100)='ip6erspan0\x00', 0xfffffffffffffeff, 0x3, 0x7}) [ 1859.278922][T11546] loop5: p1 p3[EZD] p4 [ 1859.289474][T11546] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1859.307184][T11546] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1859.315509][T11546] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000eff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:28 executing program 0: syz_read_part_table(0x1, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="15a571d49a7ee941c3a168c2e0b8bbf335496d452f0b032e059d06d89d1069e91c35bb61d795c31da71f21c02b16b817aeca391296862e23369f297833bc0044fb1b13d31adeedd01c6f3313e83b206599ad84f6b4d5d597facf1c6364e5dccc710b5bfdb32c00e0dfda60e2a5d22aff9de2d1ff0a501f4d70aec8cdc9f5b20a3f546f928b3b58a4b48138318d4ca0003b408b2e6f0a0d886da1bb564e4d739ddb13df8905bda6575b831472032a3a483d", 0xb1, 0x2}]) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4800, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYRES16=r1], 0x34}, 0x1, 0x0, 0x0, 0x4044052}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe4, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_NODE={0xb0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "86b12cae64fb661856d6edf80b1e7353631045647e2a6462810b80a1"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "e186bf79744fd1cc57cc7f78005c9455dbc3354c0a6322818e5bead12c51ffb7cab9"}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4081}, 0x2000054) [ 1859.541193][T11575] loop5: p1 p3[EZD] p4 [ 1859.546238][T11575] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1859.554511][T11575] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1859.562481][T11575] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x9, 0x6, 0x301, 0x0, 0x0, {0x7, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x28, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x2}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20008050}, 0x40080) sendmsg$NFT_BATCH(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000001000)={{0x14}, [@NFT_MSG_NEWSETELEM={0xc24, 0xc, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xbe4, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x3a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3e2}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0x20, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY_END={0x1b4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x55, 0x1, "8f8817870ded6968a111a9375838a03daccb25611363c8ac07f7ad547ef1c8def72e4ce20d5ed241bdc1f323e14828e412ea3034ca6259162a297a95e64612b2017a2c1bdf33e8300101ba69332dd0539f"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xaf, 0x1, "fe89ab40aaa55612ca42002c24c6d094935cc600d689f1810ce3697e2864b6b11f29834a0b7a70fce1de3572bbc3f6fe24be2907e89f8e5a49654522a26112aabb03a24afe51d15f821df0b40fcca60c4e2438dc8c53393f7a2e55eb50795c70e300b6c87c9f73662e644682804ff7084d0072ba78bc7589ce113fca7933da4d6d9019d1c688b1c07157880f5456eedf7158dba17c7e50bf399c3d98e61024892f79904d688c8e2cbcb5b2"}, @NFTA_DATA_VALUE={0x99, 0x1, "baa1c974f1222080983e16fc11aa490e902a5d47bf76d3e5623a715c573295bbb1923ef7ff0949f26be0023ae0a94ca6182049cda11eae26bfece102da8ef0ff7e6d842f8459d7c31aa1a7caa867605f0e525b3c6235ab3d12b5096fdc322aeb049c71e48dc6c98b8a70a6240a96c4d3316b962abfc4de3f181c562ff11a793d67984582cd7dd74240097eae6e450fea4a8eccb38b"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0xe5, 0x6, 0x1, 0x0, "2c994e05722a8d2369ecc61e20c1052e64554a65c6d8de750e36fb32ef583a6bc195f3c6d450159e7ced70e9788e1e8d7cb76299c3b70f43861e237a6ab6e4dcdb4a715e4ea51af1619d9f415d7dae0e9483ae0c96e1075ee807cca492207c6a3bc70fddb4f5810dafc09a8e8f0d0b4dfdbcf2b7cbc95ed313503f6661de015caae2771feeff3c4886810afd4d8acf3dc556b5befa24a84b0fc6489ea4e9a1ad53703eaed773eeef43f7911128a5dd672597848f4003bb2d71146756bca7d92e2a14a36b5f9816cdae74e7adf8c0532db5aadc75baa4708763aceefdac017c70d2"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0xb8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb3, 0x1, "9ed17701a8e43e8734cb35b8b39079690eebdc98d7f87492ab635cc9850458c8f4f7dc4e3196f15eb8fd488d1ff74af6b07038b3e3ee3d94272d5f7e7cfbd2ab67a37428388f130b9da0ac99f1602dade8c51ca7bb661921ee4221c6c56808b63b5d6761125e72c1fdafc2d71ee9d0e74e0fb104f7e75b63cfcb08836d0ebff0d06a2b556034447815fcc10d4807c981d7cccd328245fd392081e158382866b21d1b39ff2e43552b28f8dae69fca08"}]}]}, {0x64c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x648, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x683a6777d02d1be0}]}, @NFTA_DATA_VALUE={0xa6, 0x1, "9b1ef837cc9b4711c453dac9e7c35187d18661ec18a9728da5e793da8814f0f3af154cfe92a246d4a7bc9768f93b69911f927f814df455a187228b2eb3234ab70ed5ef88540a13e0580d6595f8c4ffc95082a9e47da7e7fe591b87eb3a65a5ecfd3c05b044ffe3667ef50d877b79374a35508962da8c9f82dbadc4cee3982418343d987478ddd65d6999cbfdf8dba8798185c33100a576d3c06585e6399c67954638"}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "398b06a748674240e6e994bc7b5dfa8c050f28b6b7e70770b5601132782f65dd190476ca6d687304bb2d84b32c6611e01f4094e01ca869f9e827f60b5ca60e408a3655bce4ebf18da0b9ac690bf12c1b64a0feb94fea962fee1e1dc3b9b85d2ab814831ba44460b98f9647ca6ef53bf265dd04341089dbb59fba8986b5aacd8c4076baa387a3b8fb3dae6722faab8c61e56f332451409fcbdf0ffae9189e883d747511e152d60c80d2ff3e2c2cd894717dfd3ad8f651eddae21ac8a5754b58661a6b8597f94a7af3ae54e124faec6990b9827161121ed89aca157d0b55e021f703b377c779"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xe4, 0x1, "b95a471c233f4e0e2ab1a0026855af490a67c06189addf40893e30a9970f1f2fd6687d2d6c785da833452c6ea554073d0ddb2b83a520bcf215ec16d21ff695766f180207314d5e8d9771e42e6f18c58e24a0415198cd976930ca187e5fe19e9a963e1f2e399695191a0177ed411e305079ed0defe12a6c307780b10ef920d055573bd981bd8245159d04c9946c6f6709820f35c90f1255ffef8b56c7ffd9548fbe8e2446e7aa40cf111b32a94a4b127512f291beae79ccea120520c607a9743792f1efb82eca566b467378ea2cf20f79bdffd78a087793518e129df94d4d847d"}, @NFTA_DATA_VALUE={0x9e, 0x1, "e0045d81a8854ef485f9fe4c23c9033e7d2c69f3b7f6356e387c3a6973bf20cd8ed9cd995adbe5d400f95a3adf0a4d24e5c4e2eb1726e9a2f117df50a0fac71a9770c90e9675a6e21f3c3319650ca7f41da7ddea0ef4a8ddb85516aa7ed78f2ef5193231c0b8b6f1efffec2010ecf50b3298189d192c95b158ab77b85dbcae93599c795880cf66665154fba771985d9f74af1d90cce456b422ec"}, @NFTA_DATA_VALUE={0x1e1, 0x1, "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"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}, {0x1d4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1b8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x7f, 0x1, "5f442868068608cc7e3957fefc77a1166c6dbe351dfe70dd012de3383e8a571109fc4961df8a25745cdab2b332e10101fe9cf1711fa8fafec2c84121857bd22e622592023ea64ff1b308d946811175502b175239409572b34bc6a9e16b4b84b61f71f85c5cb6e11ef064d906c12ea368ee1fb80588d20adaa42b47"}, @NFTA_DATA_VALUE={0x47, 0x1, "7a7fc73fd82d160b7a7d30529e9036ad8cee1346db966bd8b4059702c501eb785ce75c5815e26dfdb19ed39ea96d124534b649bd3accd1d22ab3428ec6dcea5bf77ea8"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xffff}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x2ec, 0x16, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x7c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'vlan1\x00'}, {0x14, 0x1, 'veth0_to_bridge\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}]}, @NFTA_FLOWTABLE_HOOK={0xec, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6b}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'bond_slave_1\x00'}, {0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK={0x14c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xcc, 0x3, 0x0, 0x1, [{0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'bond_slave_1\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7f}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xf38}, 0x1, 0x0, 0x0, 0x20004090}, 0x80) syz_read_part_table(0x400000000003, 0x3e, &(0x7f0000000140)) 14:50:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0xe80}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810010ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r5, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r7, @ANYBLOB="0000ffffffec00001c0028801800018014000a00000000e6ff000000800000000000000008ed0d"], 0x44}}, 0x0) connect$packet(r2, &(0x7f0000000080)={0x11, 0x2, r7, 0x1, 0x2, 0x6, @random="c2f1dc68d8c6"}, 0x14) dup2(r4, r3) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$IPSET_CMD_HEADER(r10, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1300080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, 0xc, 0x6, 0x301, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) poll(&(0x7f0000000040)=[{r0, 0x4400}, {r3, 0x4000}], 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) fchdir(r2) r3 = dup(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r4, @ANYBLOB="02002dbd7000ffdbdf2507000000088a4018bb00000008000600feffffff7be5dcaaba4cb08c"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000004) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x14) unshare(0x200) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000180)=0xd, 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r6, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) pselect6(0x40, &(0x7f0000000080)={0x7, 0x20, 0x20c, 0x200, 0x20, 0x28da, 0x400, 0x6}, &(0x7f00000000c0)={0x5, 0x4, 0x6000000, 0x2, 0x5, 0x4, 0x7, 0x9}, &(0x7f0000000100)={0x2, 0x0, 0x2f, 0x5, 0x1f, 0x6, 0x7, 0x2f5a}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x7]}, 0x8}) [ 1860.164829][T11607] netlink: 'syz-executor.0': attribute type 40 has an invalid length. [ 1860.173264][T11607] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1860.186464][T11604] loop5: p1 p3[EZD] p4 [ 1860.191522][T11604] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1860.205203][T11604] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810011ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='&#\x00', r0) keyctl$describe(0x6, r1, &(0x7f00000000c0)=""/98, 0x62) [ 1860.216463][T11604] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1860.234299][T11607] netlink: 'syz-executor.0': attribute type 40 has an invalid length. [ 1860.243214][T11607] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 14:50:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x1400}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:29 executing program 0: syz_read_part_table(0xffffffffffffffff, 0x3, &(0x7f0000000240)=[{&(0x7f0000000000)="c4363a002a5d4afca76fbb2d9da0575bd674543e55ce43a5a632ab97d6be997040974d02c2014f9fb865ef71ddf27df5a7eef8fd9c5ae96677741a286de11b7c12700077399137c9d484b3f643309fddb3ac5c2515b31a24eedf600fea31a64d0d418d334ab6fdd26a4232ccfa47ca07581771192f49b06b75573f6b07f626a3ca871ae186a10f4ea7dbc9b8f809429ab14f5a9146b28b9ae3e593532cea1409c5ce21cba379739926b528015a4785d55f044f75b976bc02b9d36b2018105a31ad63f554364b03e898cb651be7034b650faa529c9578eecedca022d32097d3b15e358fcc9abaccc5273058d4ac85396cd263", 0xf2, 0x100000001}, {&(0x7f0000000100)="a3935ab7021e09a8d6175c", 0xb, 0x7fff}, {&(0x7f0000000140)="7055c6d12b1e6812896d6d812cb23941da4b5b58e66ca36dd94d899a98380ede7bd057ae5cefeffdfb1696cc4a7bfdabd687a510120d66b515d75f34c7c8bc6b2173e8196b7a3457b35f81d3842097310347648a75508bfd466d0610cc27e5876cc2615e76775a40266684934a421d2fc66df0d2a4562268a1769a9cfbd4b325be8df577181da7efec15a95f88a14b93660106b960f2e60625c858c337909418bf8163284f1e297933adc32da786fc5191dd364e9a079a66626151980d6c2fbc0c", 0xc1}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) setns(r0, 0x40000000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x8, &(0x7f0000000440)=[{0x1ff, 0x9, 0x1f, 0x7}, {0x8, 0x8, 0x5b, 0x9}, {0x1, 0x9, 0x1f, 0x1000}, {0x3, 0x3, 0x2, 0x9}, {0x6, 0xff, 0x9d, 0x1}, {0x326, 0x40, 0xfe, 0x5}, {0x3f, 0x3f, 0x8e, 0xfff}, {0x6, 0x9, 0x5, 0x8}]}, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) copy_file_range(r2, &(0x7f0000000400), r4, 0x0, 0x4, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000002c0)={'security\x00', 0xb8, "3ec845aa645a42845cfe737d9df57b18ccca823d8e15811d6c45a8ca5710c983a65240201d38f78f13e1d32a387ab3b2f9ed1158f444f40eb0b1704a1bb78cd6de29f37ae6c4058898cbe7e7a3edb875ba4ab8f602d738c13ff9571f1efef18a090a0b00c5db2885db9edea89e1f9f56c8995b3235a0f11c6f3ec50d7a254a0f3d552a41a49157008c1ece29a3fe16b959d0b52555d02ceac83f458d4e357ca77ed2ecc8319d37eb1427e7b90513926086a0bc521d1ad96f"}, &(0x7f00000003c0)=0xdc) 14:50:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = fsmount(r0, 0x1, 0x100) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x3f8, 0x210, 0x110, 0x0, 0x310, 0x310, 0x310, 0x4, &(0x7f0000000080), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@multicast, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4, 0x1}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x1, 0x1, {0x99}}}}, {{@uncond, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "a758d5f88cfed1f2945d8bcbb7d1e6ebe1f9ad366517199631a195d5ebc9"}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x448) syz_read_part_table(0x3, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="020181000fff0a000000ff45ac0000ffffffa500e93119d6ff4a774bd596cadab30000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x4a, 0x5}]) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f00000000c0)=[{}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) 14:50:29 executing program 0: r0 = memfd_create(&(0x7f00000006c0)='\x19[\x83s{\x96\x02y\xd0\x96\x8dS_\x86\xeb\x02Y\x1c\xc9\x05\xe7 \xa9TG\xdd\xf7\xd4\xee\xbful\x14\xdaI\xca\xc4-G \xda\\\xea4\xcd\xcc\xd39HZ\x00\x00\x01\x00\x00\x00\x00\x009([VM3\xdb\x10\xe4\xcb\x10Q\xfe9\xccZ\a\x9b\x80\xee3\xa39\x1e!\xa6W\xf6\xf3\xaf\xefO&\xb6\x8e\xfd\x1e\xa8\xe28\xae\x9c\xeb\xbd&\xe5/\x99*\xe6K:\'/\xa2\xe8J\\\xfb\xd3fl\xff\xf4\xb0\xd5\x1e#\x00i+\xdb\xc9\x90\xe9\xf8?\xd7\xafF\x03\xbaQ\xe0\xad>\xa9H+V\x15\xb5\x01\x80\x00\x00\x00\x00\x00\x00Y\xfca}\x06p\x15Qx.\xd6\x03\xf5\x95\xa3\x97X\xb4F\xaf\x87\xef!S\x94\xe6a\xebG2\xb9\xf8\xc0\x12fB\x83n;\xd7_\rn\xf6\x94\xf2\xa5\xb8\xa8`\xe0{\"\x95Xw\x84\x1d\xdac[d\xbb\x06g(Q\xd5\v_Ho\xa1\xcf\xb8\fm\xa0Q\x9b\x86*\x06w\xc8\xe4\xd3\xd7\xfdV\xdb\x81\bL\x9aF\xde@\xd1\xa8\xb3\x00\\\x96\xccPa\xdb\xb3\xe9\xb9}\xdbkc\xc8E\x145{w\xbf\x8d\x9aj\xeaO?\x13\xc6\xa7\f\xbe\x18Q2\xf2\xa3\x91\xf8=O\x84\xda>\xa6uq\xf8\x99\x19kxI\x0f\xfa\xa7@\x84\xdf\xaeZoneo\x8f\x972\xaf\xca]\x829(\v<\xc1}\xe71\x8de&\xaa\xca\x1c6\xe1m\xbcl\x94hE\xb6\xaa\x1a\xa0E\bS\xb5\x85\x9c\xec\xbe\xd3n/\xc2\xce\x97\x89\xe2h\x80ur\xfe\n\xf0X\xef\x88\xf5\xe4G\x0e#\xe4\xc0(\xdb\x15\xea\x8fa\xcdT+_\x98\xffUQ\xaae\xbb#bN{d\xe0\x165\xd3\xca\xc6(:\x16\x02C\x8aN:\xa8\xcc\xcb\xe6>[ \x7f\x9c\x1d\xb2B\xcd#\x9b \xc8\xcb\xa3[\xc3r2u\x93s\xafem\xb9(\x06\x00\x00\x00\xdb3\x86\xcf;A\x1e\xeb\xce\xeb.{b\xc9\xacx\xd0\x1d\x90\x1ei\bcM\x96\xb1q\xcdI\xae\xa6\x90\xd2{v\xc9\x02E\xcd\xa1\x90\x00\f\xe9\x9af_\x91J\xe5\x14=\xfb\xa5{\xd0\x0e\xf3\xbd\x7f\xc2|2P\xe1/Rj\x82\xfbDo\x8d\xf2\x8bY\x869\x11\xc7@`:\xe3\xc3\xa3\xf4\xa8\xa10\xaf\x97E\xab\xa7\xdb7\r\r\xdb\xd8\xc0\xf7s~H\xe7\xea\xe6\x06\x12h\x11\r\x1f\x13\x13\xb8\"\xceN\xd6\xa9\r\xba\'\xac\x8d*\xfd\xa9N`\x00\x00\x00\x00af2\x1aRh5\x99s6\x00O\xa6\x81^\xc7\xb5\xeb\xb9`\xa5/fb\x9e|{\x1f\xc7\xee:_\xba\x89\x9e\xb8\xa5\xc5B#\xac\xdd5\xd9\xfd\xdco%v\x90\x8f\vI\x8ef\v\xb6\x80E\x03\xd4 \xf82\xb5\xa7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1,\x9b\x1eT\x9fa\x8eu\xf9\x00\x00\x00', 0x0) write(r0, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) syz_read_part_table(0x80000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1}]) [ 1860.360176][T11629] loop5: p1 p3[EZD] p4 [ 1860.365000][T11629] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1860.388596][T11629] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1860.398948][T11629] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="0201810012ff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:29 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2002000, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x401}}, {@mode={'mode', 0x3d, 0x81}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x531}}, {@mode={'mode', 0x3d, 0xd8}}, {@mode={'mode', 0x3d, 0x7fffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '$'}}]}) 14:50:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1860.551087][T11658] loop5: p1 p3[EZD] p4 [ 1860.555356][T11658] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1860.567748][T11658] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1860.575728][T11658] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = getpid() sendmsg$netlink(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x2b, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3847a9ba83b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bf3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0xfeeb) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000340)={0x2c, 0x0, r8}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r9) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x9c00, r9, &(0x7f0000000080)="ef2b88e1ea567c9b4c6800733514ac3accd02d3ef844fca2fb7ddf417980cc35e26e6845aa27a86277cbb72a2cc44c9f373c0b95cf475659e123cc5955b09aaa21431a51dbd9514fdcfc89694832dddb85aa97b94ed08902538a767ebcf40aa82e23dca20c7584eb93addf541493432a1e963478d32fd6c969", 0x79, 0x8}]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x808000, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@smackfsdef={'smackfsdef', 0x3d, '+\'*([)'}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}]}}) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x1c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000f0e0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0xd}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:30 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000000)="aa3d0f8360c666230dbb8b42179d8561", 0x10) 14:50:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r1, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1861.098628][T11677] loop5: p1 p3[EZD] p4 [ 1861.103040][T11677] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1861.129446][T11677] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1861.142768][T11677] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff02000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f00000000c0)={{{0x9, 0x1}}, 0x8d, 0x56, &(0x7f00000001c0)="6c9f67d4efbcd53c89e80b0e4067f2b7e576735626304ddfbe80d11763afa4d191eadccd4fb84bee00fba266f3719289621b8007e3dd15ee31e306e75850c483a863b440ba984aaf0f049c31bc7746267af48811b9eb6695ad0852f17d3132049fbdcd096f80930ab79150eedc04f971dcc5d535de9107b18d8bc68c09e9e6900184d1d5214de68ad4bc09527f"}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000280)="020181080fff0a00ff45ac1900000000003e3ba2579bda008a00000087770072f02f070081fffffe00000000008000da55aa0000d2141ff2788bdd70a04cb0b5960375955e718c8f3fcf93f744c14d6f598764de29ffc0221a0a3130ec08b4", 0x5f, 0x4}]) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HIDIOCGRDESC(r4, 0x90044802, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 14:50:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2900}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:30 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x7, 0x3, 0x0, 0x0, {0xc, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffb}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x80000001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2d}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3ff}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x48010}, 0x10) 14:50:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x40000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0xfd87) sendmsg$nl_route(r6, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010800"/20, @ANYRES32=r8, @ANYBLOB="00000000000000001c0016801800018014000a00000000e6ff000000000000000000000008000d"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x160, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x200080d0}, 0x40000) dup2(r4, r3) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000000)) clone(0x76041100, 0x0, 0x0, 0x0, 0x0) 14:50:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1861.348495][T11699] loop5: p1 p3[EZD] p4 [ 1861.367330][T11699] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1861.385076][T11699] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1861.402601][T11699] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1861.426963][T11710] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:50:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x21}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff03000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:30 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010048) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000240)={0x0, 0x8, 0x8, 0x7, 0x4}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x7c, r5, 0x4, 0x70bd26, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x574}, {0x6, 0x11, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x1}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x819) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0x12c, r5, 0x1, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x5}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r5, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x5}, {0xc, 0x90, 0x3}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40884}, 0x20008040) read(0xffffffffffffffff, &(0x7f0000000300), 0x0) [ 1861.523980][T11720] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000000)={0x1, 0x7fffffff, 0x80}) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) [ 1861.676422][T11731] loop5: p1 p3[EZD] p4 [ 1861.680958][T11731] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1861.703863][T11731] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2b00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1861.731493][T11731] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff04000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000140)='net/sco\x00') fchdir(r4) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000080)) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x88002, 0x0) 14:50:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x3a}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f0000000000)=[{&(0x7f0000000080)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170103ef4738f88b9f52fc747b550000000a00720030070081ffffff00ca0000008000da55aa0000000000", 0x2b, 0x1c0}]) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1861.980665][T11762] loop5: p1 p3[EZD] p4 [ 1861.988678][T11762] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:31 executing program 0: syz_read_part_table(0x1000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1862.032108][T11762] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1862.064059][T11762] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r4) dup2(0xffffffffffffffff, r4) r6 = dup3(r2, r3, 0x80000) setns(r6, 0x20000000) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff05000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x202002) keyctl$chown(0x4, r1, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="7111d407d67fedc17eac1ef5e49c607725105400e1a3bf54676dec9692d0d0f09382263bc68393b1b2050ee8905d39f65fc4d270d1139bddea6018392d", 0x3d, r1) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x58}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 0: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x202002) keyctl$chown(0x4, r1, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="7111d407d67fedc17eac1ef5e49c607725105400e1a3bf54676dec9692d0d0f09382263bc68393b1b2050ee8905d39f65fc4d270d1139bddea6018392d", 0x3d, r1) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0a000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000000)={0x1, 0x7fffffff, 0x80}) setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setns(r8, 0x8000000) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1862.550285][T11801] loop5: p1 p3[EZD] p4 [ 1862.554918][T11801] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1862.564175][T11801] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(0xffffffffffffffff, 0x0) clone(0x70020004, 0x0, 0x0, 0x0, 0x0) [ 1862.597571][T11801] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff07000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x100}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1862.808032][T11835] loop5: p1 p3[EZD] p4 [ 1862.812351][T11835] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1862.830326][T11835] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1862.847516][T11835] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff09000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1863.049517][T11854] loop5: p1 p3[EZD] p4 [ 1863.061796][T11854] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1863.080613][T11854] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1863.089218][T11854] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x4000}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff0f000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = getpid() sendmsg$netlink(r6, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@cred={{0x1c, 0x1, 0x2, {r9, 0x0, r8}}}], 0x20}, 0x0) getgroups(0x7, &(0x7f00000001c0)=[0xee00, 0x0, 0x0, 0xee01, r3, r5, r8]) setfsgid(r10) unshare(0x200) r11 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r11, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1863.416459][T11866] loop5: p1 p3[EZD] p4 [ 1863.421482][T11866] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1863.443550][T11866] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff10000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1863.476338][T11866] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x5800}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1863.627313][T11883] loop5: p1 p3[EZD] p4 [ 1863.633552][T11883] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1863.662453][T11883] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1863.674823][T11883] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff11000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x800e}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1863.895330][T11905] loop5: p1 p3[EZD] p4 [ 1863.900100][T11905] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1863.911241][T11905] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1863.921129][T11905] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) mlockall(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff12000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff15000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1864.251345][T11932] loop5: p1 p3[EZD] p4 [ 1864.256284][T11932] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1864.264915][T11932] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1864.273825][T11932] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1864.423579][T11951] loop5: p1 p3[EZD] p4 [ 1864.428079][T11951] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1864.442053][T11951] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1864.451306][T11951] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff16000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1864.599844][T11967] loop5: p1 p3[EZD] p4 [ 1864.604763][T11967] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1864.615110][T11967] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1864.631712][T11967] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff17000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x38, r5, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_BEACON_HEAD={0x24, 0xe, "080fec1b94dc5b4f3ee83ea2a259123e3a79acfe0b10083f5465cd9670f1e4d1"}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_bond\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1000, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x4}}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'vlan1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x240408c4}, 0x0) r6 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) fchdir(0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x3, 0x0, 0x2d32a73c, 0x0, 0x2}) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r9 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r9, 0x0) clone(0x8840900, 0x0, 0x0, 0x0, 0x0) 14:50:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1865.077496][T11984] loop5: p1 p3[EZD] p4 [ 1865.082099][T11984] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1865.106093][T11984] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1865.115032][T11984] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff18000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80d}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000080) dup(r0) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) unshare(0x200) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r8, 0x20000) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000000)=""/158) setns(r2, 0x0) fcntl$setlease(r0, 0x400, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 14:50:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1865.272789][T12007] loop5: p1 p3[EZD] p4 [ 1865.277383][T12007] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1865.302300][T12007] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1865.312996][T12007] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff19000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x811}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:34 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1865.480652][T12039] loop5: p1 p3[EZD] p4 [ 1865.485499][T12039] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1865.499103][T12039] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1865.528537][T12039] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1865.607753][T12046] print_req_error: 15 callbacks suppressed [ 1865.607761][T12046] blk_update_request: I/O error, dev loop5, sector 24704 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1865.627584][T12064] blk_update_request: I/O error, dev loop5, sector 24586 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1865.627743][T12065] blk_update_request: I/O error, dev loop5, sector 24704 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1865.640634][T12039] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 1865.651420][ T115] blk_update_request: I/O error, dev loop5, sector 24704 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.675925][ T115] buffer_io_error: 8 callbacks suppressed [ 1865.675933][ T115] Buffer I/O error on dev loop5p4, logical block 24704, async page read [ 1865.690277][ T115] blk_update_request: I/O error, dev loop5, sector 24586 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.701513][ T115] Buffer I/O error on dev loop5p3, logical block 24576, async page read [ 1865.710098][ T115] blk_update_request: I/O error, dev loop5, sector 24587 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.721360][ T115] Buffer I/O error on dev loop5p3, logical block 24577, async page read [ 1865.729783][ T115] blk_update_request: I/O error, dev loop5, sector 24588 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.741011][ T115] Buffer I/O error on dev loop5p3, logical block 24578, async page read [ 1865.749391][ T115] blk_update_request: I/O error, dev loop5, sector 24589 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.760621][ T115] Buffer I/O error on dev loop5p3, logical block 24579, async page read [ 1865.769011][ T115] blk_update_request: I/O error, dev loop5, sector 24590 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.780244][ T115] Buffer I/O error on dev loop5p3, logical block 24580, async page read [ 1865.788642][ T115] blk_update_request: I/O error, dev loop5, sector 24591 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1865.799920][ T115] Buffer I/O error on dev loop5p3, logical block 24581, async page read [ 1865.808310][ T115] Buffer I/O error on dev loop5p3, logical block 24582, async page read [ 1865.816690][ T115] Buffer I/O error on dev loop5p3, logical block 24583, async page read [ 1865.825049][ T115] Buffer I/O error on dev loop5p1, logical block 24704, async page read 14:50:35 executing program 1: 14:50:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff21000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x821}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r0) 14:50:35 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1866.155901][T12080] loop5: p1 p3[EZD] p4 [ 1866.164982][T12080] loop5: p1 size 11290111 extends beyond EOD, truncated 14:50:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff22000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1866.216576][T12080] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1866.225122][T12080] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff23000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x247a04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) truncate(&(0x7f0000019180)='./bus\x00', 0x85) 14:50:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83a}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1866.412812][T12125] loop5: p1 p3[EZD] p4 [ 1866.417523][T12125] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1866.442900][T12125] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1866.467139][T12125] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff24000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x247a04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) truncate(&(0x7f0000019180)='./bus\x00', 0x85) 14:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x858}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff25000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x18, 0x0}) [ 1866.676492][T12156] loop5: p1 p3[EZD] p4 [ 1866.681017][T12156] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1866.688965][T12156] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1866.697116][T12156] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 1866.806128][T12153] ================================================================== [ 1866.814253][T12153] BUG: KASAN: use-after-free in try_to_del_timer_sync+0x3bd/0x480 [ 1866.822048][T12153] Write of size 8 at addr ffff8881c85c3180 by task syz-executor.4/12153 [ 1866.830341][T12153] [ 1866.832651][T12153] CPU: 0 PID: 12153 Comm: syz-executor.4 Not tainted 5.4.56-syzkaller-00005-g8555f0d9d303 #0 [ 1866.842793][T12153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1866.852829][T12153] Call Trace: [ 1866.856120][T12153] dump_stack+0x14a/0x1ce [ 1866.860446][T12153] ? show_regs_print_info+0x12/0x12 [ 1866.865619][T12153] ? printk+0xd2/0x114 [ 1866.869680][T12153] print_address_description+0x93/0x620 [ 1866.875217][T12153] ? devkmsg_release+0x11c/0x11c [ 1866.880129][T12153] ? _raw_spin_lock_irqsave+0xfc/0x1e0 [ 1866.885579][T12153] __kasan_report+0x16d/0x1e0 [ 1866.890230][T12153] ? try_to_del_timer_sync+0x3bd/0x480 [ 1866.895672][T12153] kasan_report+0x36/0x60 [ 1866.899978][T12153] try_to_del_timer_sync+0x3bd/0x480 [ 1866.905238][T12153] del_timer_sync+0x74/0xe0 [ 1866.909717][T12153] tun_free_netdev+0x99/0x3a0 [ 1866.914370][T12153] ? find_next_bit+0xd8/0x120 [ 1866.919022][T12153] ? tun_xdp+0x3d0/0x3d0 [ 1866.923267][T12153] netdev_run_todo+0xbe3/0xe90 [ 1866.928016][T12153] ? slab_free_freelist_hook+0xd0/0x150 [ 1866.933559][T12153] ? netdev_refcnt_read+0x1a0/0x1a0 [ 1866.938744][T12153] ? __sk_destruct+0x3f9/0x480 [ 1866.943482][T12153] ? kfree+0x12b/0x600 [ 1866.947781][T12153] ? netdev_state_change+0xa2/0x210 [ 1866.952963][T12153] ? netdev_features_change+0x150/0x150 [ 1866.958476][T12153] ? __module_put_and_exit+0x20/0x20 [ 1866.963751][T12153] ? __sk_destruct+0x3f9/0x480 [ 1866.968482][T12153] ? __sk_free+0x325/0x410 [ 1866.972868][T12153] tun_chr_close+0xc0/0xd0 [ 1866.977256][T12153] ? tun_chr_open+0x4a0/0x4a0 [ 1866.981929][T12153] __fput+0x27d/0x6c0 [ 1866.985882][T12153] task_work_run+0x176/0x1a0 [ 1866.990445][T12153] prepare_exit_to_usermode+0x286/0x2e0 [ 1866.995962][T12153] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1867.001826][T12153] RIP: 0033:0x4167f1 [ 1867.005690][T12153] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1867.025269][T12153] RSP: 002b:00007ffd5ed87780 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1867.033677][T12153] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004167f1 [ 1867.041638][T12153] RDX: 0000000000000000 RSI: 000000000000028a RDI: 0000000000000003 [ 1867.049584][T12153] RBP: 0000000000000001 R08: 000000003532a28a R09: 000000003532a28e [ 1867.057530][T12153] R10: 00007ffd5ed87870 R11: 0000000000000293 R12: 000000000078c900 [ 1867.065475][T12153] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bfac [ 1867.073423][T12153] [ 1867.075736][T12153] The buggy address belongs to the page: [ 1867.081340][T12153] page:ffffea00072170c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 1867.090415][T12153] flags: 0x8000000000000000() [ 1867.095113][T12153] raw: 8000000000000000 0000000000000000 ffffea0007217088 0000000000000000 [ 1867.103675][T12153] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1867.112228][T12153] page dumped because: kasan: bad access detected [ 1867.118670][T12153] [ 1867.121015][T12153] Memory state around the buggy address: [ 1867.126630][T12153] ffff8881c85c3080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1867.134673][T12153] ffff8881c85c3100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1867.142716][T12153] >ffff8881c85c3180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1867.150745][T12153] ^ 14:50:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1867.154793][T12153] ffff8881c85c3200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1867.162821][T12153] ffff8881c85c3280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1867.170847][T12153] ================================================================== [ 1867.178893][T12153] Disabling lock debugging due to kernel taint 14:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe0}}}, 0xb8}}, 0x0) [ 1867.228626][T12182] loop5: p1 p3[EZD] p4 [ 1867.241234][T12182] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1867.255927][T12182] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1867.263850][T12182] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:36 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff800000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:50:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) 14:50:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff26000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f0000000280), 0x0) 14:50:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 14:50:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1867.466811][T12206] loop5: p1 p3[EZD] p4 [ 1867.471481][T12206] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1867.480331][T12206] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1867.489842][T12206] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff27000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0xd}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1867.747822][T12248] loop5: p1 p3[EZD] p4 [ 1867.762321][T12248] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1867.779996][T12248] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1867.794305][T12248] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff28000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x14}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 1868.048436][T12288] loop5: p1 p3[EZD] p4 [ 1868.059646][T12288] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1868.100498][T12288] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1868.116425][T12288] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 14:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff29000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x1c}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1868.268550][T12324] loop5: p1 p3[EZD] p4 [ 1868.273401][T12324] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1868.292908][T12324] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1868.301427][T12324] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff2b000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 14:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1868.530342][T12353] loop5: p1 p3[EZD] p4 [ 1868.536271][T12353] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1868.559413][T12353] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1868.580557][T12353] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff2c000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x29}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) [ 1868.758341][T12381] loop5: p1 p3[EZD] p4 [ 1868.762873][T12381] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1868.783320][T12381] loop5: p3 size 1912633223 extends beyond EOD, truncated 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1868.806029][T12381] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff2d000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x2b}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1869.056187][T12409] loop5: p1 p3[EZD] p4 [ 1869.060540][T12409] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1869.086159][T12409] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1869.094370][T12409] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff2e000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x2c}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) [ 1869.318812][T12435] loop5: p1 p3[EZD] p4 [ 1869.330331][T12435] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1869.347052][T12435] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1869.355216][T12435] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff2f000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff30000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 1869.537826][T12463] loop5: p1 p3[EZD] p4 [ 1869.543105][T12463] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1869.552478][T12463] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1869.561315][T12463] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x2f}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1869.681048][T12479] loop5: p1 p3[EZD] p4 [ 1869.685436][T12479] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1869.695689][T12479] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1869.726046][T12479] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff33000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2c00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x3c}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) [ 1869.953048][T12508] loop5: p1 p3[EZD] p4 [ 1869.957700][T12508] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1869.965546][T12508] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1869.974803][T12508] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff38000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x8906, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x2f00}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, 0x0, 0x0) [ 1870.229488][T12537] loop5: p1 p3[EZD] p4 [ 1870.233861][T12537] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1870.247769][T12537] loop5: p3 size 1912633223 extends beyond EOD, truncated [ 1870.257066][T12537] loop5: p4 size 3657465856 extends beyond EOD, truncated 14:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x4, &(0x7f0000000140)=[{&(0x7f0000000180)="020181000fff3c000000ff45ac0000ffffffa500e931190000000000000680170003550000000a000000877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 14:50:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000280)={@val={0x2}, @void, @eth={@random="9f84bb57964b", @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @remote}, {{}, {0x0, 0x0, 0x0, 0x0, 0x58}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 14:50:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) [ 1870.478017][T12563] loop5: p1 p3[EZD] p4 [ 1870.482586][T12563] loop5: p1 size 11290111 extends beyond EOD, truncated [ 1870.489630][ C1] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 1870.489637][ C1] #PF: supervisor instruction fetch in kernel mode [ 1870.489642][ C1] #PF: error_code(0x0010) - not-present page [ 1870.489646][ C1] PGD 1c9cf1067 P4D 1c9cf1067 PUD 1cc8e2067 PMD 0 [ 1870.489662][ C1] Oops: 0010 [#1] PREEMPT SMP KASAN [ 1870.489673][ C1] CPU: 1 PID: 12563 Comm: syz-executor.5 Tainted: G B 5.4.56-syzkaller-00005-g8555f0d9d303 #0 [ 1870.489677][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.489686][ C1] RIP: 0010:0x0 [ 1870.489693][ C1] Code: Bad RIP value. [ 1870.489698][ C1] RSP: 0018:ffff8881db909c08 EFLAGS: 00010202 [ 1870.489704][ C1] RAX: ffffffff813304ac RBX: 0000000000000000 RCX: ffff8881cfb99f00 [ 1870.489709][ C1] RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881c85c3180 [ 1870.489714][ C1] RBP: ffff8881c85c31a0 R08: ffffffff81330347 R09: ffffed103b7246e7 [ 1870.489719][ C1] R10: ffffed103b7246e7 R11: 0000000000000000 R12: 0000000000000000 [ 1870.489724][ C1] R13: 0000000000000101 R14: ffff8881c85c3188 R15: ffff8881c85c3180 [ 1870.489730][ C1] FS: 00007fab82075700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 1870.489734][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1870.489738][ C1] CR2: ffffffffffffffd6 CR3: 00000001c6108003 CR4: 00000000001606e0 [ 1870.489746][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1870.489760][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1870.489762][ C1] Call Trace: [ 1870.489766][ C1] [ 1870.489777][ C1] call_timer_fn+0x154/0x340 [ 1870.489786][ C1] expire_timers+0x35c/0x470 [ 1870.489794][ C1] __run_timers+0x662/0x7b0 [ 1870.489803][ C1] ? enqueue_hrtimer+0x1cf/0x230 [ 1870.489810][ C1] ? __internal_add_timer+0x490/0x490 [ 1870.489816][ C1] ? __run_hrtimer+0x601/0x7a0 [ 1870.489825][ C1] ? clockevents_program_event+0x214/0x2d0 [ 1870.489832][ C1] ? hrtimer_interrupt+0xe75/0x10a0 [ 1870.489840][ C1] run_timer_softirq+0x19/0x30 [ 1870.489848][ C1] __do_softirq+0x2d5/0x725 [ 1870.489857][ C1] ? __irqentry_text_end+0x1fc47b/0x1fc47b [ 1870.489863][ C1] ? hrtimer_init+0x340/0x340 [ 1870.489870][ C1] irq_exit+0x16d/0x180 [ 1870.489876][ C1] smp_apic_timer_interrupt+0x281/0x3f0 [ 1870.489885][ C1] apic_timer_interrupt+0xf/0x20 [ 1870.489888][ C1] [ 1870.489896][ C1] RIP: 0010:console_unlock+0xabf/0xe50 [ 1870.489904][ C1] Code: b8 34 64 85 e8 f2 77 ab 02 84 db 48 8b 5c 24 30 0f 85 59 03 00 00 e8 80 0c 16 00 e8 2b 60 00 00 48 89 5c 24 70 ff 74 24 70 9d 5c f7 ff ff e8 67 0c 16 00 48 c7 05 5c 36 38 04 00 00 00 00 e9 [ 1870.489908][ C1] RSP: 0018:ffff8881d400eba0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1870.489915][ C1] RAX: ffffffff812c5945 RBX: 0000000000000246 RCX: 0000000000040000 [ 1870.489919][ C1] RDX: ffffc9000e85a000 RSI: 0000000000003064 RDI: 0000000000003065 [ 1870.489924][ C1] RBP: ffff8881d400ed50 R08: dffffc0000000000 R09: 0000000000000003 [ 1870.489928][ C1] R10: ffffed103a801d65 R11: 0000000000000004 R12: ffffffff84cad428 [ 1870.489932][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1870.489940][ C1] ? __printk_safe_exit+0x5/0x10 [ 1870.489949][ C1] ? vprintk_emit+0x4f0/0x4f0 [ 1870.489956][ C1] ? down_trylock+0x51/0x90 [ 1870.489963][ C1] ? __printk_safe_exit+0x5/0x10 [ 1870.489968][ C1] ? console_trylock+0x16c/0x1d0 [ 1870.489975][ C1] ? resume_console+0x40/0x40 [ 1870.489983][ C1] vprintk_emit+0x1f9/0x4f0 [ 1870.489991][ C1] ? vprintk_store+0x690/0x690 [ 1870.490001][ C1] ? slab_free_freelist_hook+0xd0/0x150 [ 1870.490011][ C1] ? kobject_uevent_env+0x370/0x1100 [ 1870.490018][ C1] printk+0xd2/0x114 [ 1870.490025][ C1] ? vprintk_emit+0x19e/0x4f0 [ 1870.490031][ C1] ? devkmsg_release+0x11c/0x11c [ 1870.490042][ C1] ? disk_expand_part_tbl+0x262/0x3b0 [ 1870.490049][ C1] rescan_partitions+0x82d/0xc30 [ 1870.490059][ C1] blkdev_reread_part+0x127/0x190 [ 1870.490068][ C1] loop_set_status+0x101c/0x1590 [ 1870.490077][ C1] lo_ioctl+0xd3c/0x2370 [ 1870.490084][ C1] ? memset+0x1f/0x40 [ 1870.490093][ C1] ? unwind_next_frame+0x1c90/0x2330 [ 1870.490100][ C1] ? lo_release+0x1e0/0x1e0 [ 1870.490110][ C1] ? unwind_next_frame+0x1c90/0x2330 [ 1870.490122][ C1] ? stack_trace_save+0x1f0/0x1f0 [ 1870.490130][ C1] ? __kernel_text_address+0x93/0x110 [ 1870.490138][ C1] ? __rcu_read_lock+0x50/0x50 [ 1870.490145][ C1] ? unwind_get_return_address+0x48/0x90 [ 1870.490153][ C1] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 1870.490161][ C1] ? kobj_kset_leave+0x3a0/0x3a0 [ 1870.490168][ C1] ? mutex_lock+0xa6/0x110 [ 1870.490175][ C1] ? __module_put_and_exit+0x20/0x20 [ 1870.490183][ C1] ? avc_denied+0x1c0/0x1c0 [ 1870.490190][ C1] ? __up_read+0x6f/0x1b0 [ 1870.490197][ C1] ? up_write+0xa1/0x190 [ 1870.490203][ C1] ? down_write+0xd8/0x150 [ 1870.490209][ C1] ? up_read+0x10/0x10 [ 1870.490217][ C1] ? disk_unblock_events+0x4b/0x50 [ 1870.490224][ C1] ? memset+0x1f/0x40 [ 1870.490231][ C1] ? unwind_next_frame+0x1c90/0x2330 [ 1870.490240][ C1] ? arch_stack_walk+0xb8/0x120 [ 1870.490248][ C1] ? unwind_get_return_address_ptr+0x130/0x130 [ 1870.490254][ C1] ? memset+0x1f/0x40 [ 1870.490261][ C1] ? unwind_next_frame+0x1c90/0x2330 [ 1870.490270][ C1] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1870.490277][ C1] ? __rcu_read_lock+0x50/0x50 [ 1870.490285][ C1] ? unwind_get_return_address_ptr+0x130/0x130 [ 1870.490292][ C1] ? lo_release+0x1e0/0x1e0 [ 1870.490300][ C1] blkdev_ioctl+0x903/0x2d10 [ 1870.490308][ C1] ? is_bpf_text_address+0x290/0x2b0 [ 1870.490315][ C1] ? stack_trace_save+0x1f0/0x1f0 [ 1870.490322][ C1] ? __kernel_text_address+0x93/0x110 [ 1870.490329][ C1] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1870.490336][ C1] ? unwind_get_return_address+0x48/0x90 [ 1870.490342][ C1] ? arch_stack_walk+0xd8/0x120 [ 1870.490350][ C1] ? __rcu_read_lock+0x50/0x50 [ 1870.490358][ C1] ? avc_has_extended_perms+0x730/0x1160 [ 1870.490366][ C1] ? avc_has_extended_perms+0xb60/0x1160 [ 1870.490375][ C1] ? avc_ss_reset+0x3a0/0x3a0 [ 1870.490382][ C1] ? __kasan_slab_free+0x1f2/0x230 [ 1870.490390][ C1] ? do_sys_open+0x642/0x7d0 [ 1870.490397][ C1] ? do_syscall_64+0xcb/0x150 [ 1870.490405][ C1] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1870.490416][ C1] block_ioctl+0xb6/0xf0 [ 1870.490423][ C1] ? blkdev_iopoll+0xf0/0xf0 [ 1870.490431][ C1] do_vfs_ioctl+0x770/0x1750 [ 1870.490439][ C1] ? selinux_file_ioctl+0x73b/0x990 [ 1870.490446][ C1] ? ioctl_preallocate+0x250/0x250 [ 1870.490455][ C1] ? __fget+0x37c/0x3c0 [ 1870.490463][ C1] ? fget_many+0x20/0x20 [ 1870.490470][ C1] ? __fpregs_load_activate+0x2d3/0x390 [ 1870.490480][ C1] ? security_file_ioctl+0xad/0xc0 [ 1870.490487][ C1] __x64_sys_ioctl+0xd4/0x110 [ 1870.490494][ C1] do_syscall_64+0xcb/0x150 [ 1870.490503][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1870.490510][ C1] RIP: 0033:0x45cb47 [ 1870.490518][ C1] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1870.490522][ C1] RSP: 002b:00007fab820749f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1870.490531][ C1] RAX: ffffffffffffffda RBX: 00007fab820756d4 RCX: 000000000045cb47 [ 1870.490535][ C1] RDX: 00007fab82074ab0 RSI: 0000000000004c04 RDI: 0000000000000007 [ 1870.490540][ C1] RBP: 0000000000000006 R08: 0000000000000000 R09: 000000000000000a [ 1870.490545][ C1] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000006 [ 1870.490549][ C1] R13: 00007fab820756d4 R14: 0000000000000007 R15: 000000000078bfac [ 1870.490554][ C1] Modules linked in: [ 1870.490560][ C1] CR2: 0000000000000000 [ 1870.490565][ C1] ---[ end trace 5b0997ab9ab4315d ]--- [ 1870.490570][ C1] RIP: 0010:0x0 [ 1870.490577][ C1] Code: Bad RIP value. [ 1870.490581][ C1] RSP: 0018:ffff8881db909c08 EFLAGS: 00010202 [ 1870.490587][ C1] RAX: ffffffff813304ac RBX: 0000000000000000 RCX: ffff8881cfb99f00 [ 1870.490592][ C1] RDX: 0000000000000101 RSI: 0000000000000000 RDI: ffff8881c85c3180 [ 1870.490597][ C1] RBP: ffff8881c85c31a0 R08: ffffffff81330347 R09: ffffed103b7246e7 [ 1870.490601][ C1] R10: ffffed103b7246e7 R11: 0000000000000000 R12: 0000000000000000 [ 1870.490606][ C1] R13: 0000000000000101 R14: ffff8881c85c3188 R15: ffff8881c85c3180 [ 1870.490613][ C1] FS: 00007fab82075700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 1870.490618][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1870.490623][ C1] CR2: ffffffffffffffd6 CR3: 00000001c6108003 CR4: 00000000001606e0 [ 1870.490632][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1870.490637][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1870.490642][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 1870.491026][ C1] Kernel Offset: disabled [ 1871.340796][ C1] Rebooting in 86400 seconds..