[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   60.524252][   T26] audit: type=1800 audit(1562514177.787:25): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[   60.547773][   T26] audit: type=1800 audit(1562514177.787:26): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   60.599592][   T26] audit: type=1800 audit(1562514177.787:27): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts.
2019/07/07 15:43:08 fuzzer started
2019/07/07 15:43:11 dialing manager at 10.128.0.26:34903
2019/07/07 15:43:11 syscalls: 2465
2019/07/07 15:43:11 code coverage: enabled
2019/07/07 15:43:11 comparison tracing: enabled
2019/07/07 15:43:11 extra coverage: extra coverage is not supported by the kernel
2019/07/07 15:43:11 setuid sandbox: enabled
2019/07/07 15:43:11 namespace sandbox: enabled
2019/07/07 15:43:11 Android sandbox: /sys/fs/selinux/policy does not exist
2019/07/07 15:43:11 fault injection: enabled
2019/07/07 15:43:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/07/07 15:43:11 net packet injection: enabled
2019/07/07 15:43:11 net device setup: enabled
15:44:38 executing program 0:

syzkaller login: [  160.839047][ T9020] IPVS: ftp: loaded support on port[0] = 21
15:44:38 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

[  161.001074][ T9020] chnl_net:caif_netlink_parms(): no params data found
[  161.043043][ T9023] IPVS: ftp: loaded support on port[0] = 21
[  161.076246][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.084026][ T9020] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.092322][ T9020] device bridge_slave_0 entered promiscuous mode
[  161.103123][ T9020] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.110304][ T9020] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.118497][ T9020] device bridge_slave_1 entered promiscuous mode
[  161.163692][ T9020] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  161.178372][ T9020] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  161.211770][ T9020] team0: Port device team_slave_0 added
[  161.220609][ T9020] team0: Port device team_slave_1 added
15:44:38 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000006000000360000000000000073003500000000009500000000000000cd8c5d02275bb0c9d0cfc95fd09bcf893b8394e854914adf72e0ee561f14bf04056ade69079367c47d1e4f44ce5fb533c97d68bb76268f3b41cb484b731f0e7a209941f9a7fb0df64e4d17aecd39"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)

[  161.309647][ T9020] device hsr_slave_0 entered promiscuous mode
[  161.366984][ T9020] device hsr_slave_1 entered promiscuous mode
[  161.449555][ T9025] IPVS: ftp: loaded support on port[0] = 21
[  161.463216][ T9020] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.470456][ T9020] bridge0: port 2(bridge_slave_1) entered forwarding state
[  161.478250][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.485329][ T9020] bridge0: port 1(bridge_slave_0) entered forwarding state
[  161.501875][ T9023] chnl_net:caif_netlink_parms(): no params data found
15:44:38 executing program 3:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  161.650476][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.666667][ T9023] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.689203][ T9023] device bridge_slave_0 entered promiscuous mode
[  161.705606][ T9023] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.715694][ T9023] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.724030][ T9023] device bridge_slave_1 entered promiscuous mode
[  161.779013][ T9029] IPVS: ftp: loaded support on port[0] = 21
[  161.781434][ T9020] 8021q: adding VLAN 0 to HW filter on device bond0
[  161.816262][ T9023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  161.845482][ T9025] chnl_net:caif_netlink_parms(): no params data found
[  161.870403][ T9020] 8021q: adding VLAN 0 to HW filter on device team0
[  161.879839][ T9023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
15:44:39 executing program 4:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900032f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

[  161.895910][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  161.909790][    T5] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.931378][    T5] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.942940][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  162.047749][ T9023] team0: Port device team_slave_0 added
[  162.065377][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  162.075446][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  162.082578][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  162.095765][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  162.110313][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  162.117467][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  162.138829][ T9023] team0: Port device team_slave_1 added
[  162.144963][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  162.157813][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  162.179872][ T9033] IPVS: ftp: loaded support on port[0] = 21
[  162.210967][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  162.227483][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  162.236245][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  162.248912][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
15:44:39 executing program 5:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  162.260154][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  162.273383][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  162.283448][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  162.311319][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  162.389903][ T9023] device hsr_slave_0 entered promiscuous mode
[  162.457269][ T9023] device hsr_slave_1 entered promiscuous mode
[  162.519957][ T9025] bridge0: port 1(bridge_slave_0) entered blocking state
[  162.528283][ T9025] bridge0: port 1(bridge_slave_0) entered disabled state
[  162.535886][ T9025] device bridge_slave_0 entered promiscuous mode
[  162.543726][ T9025] bridge0: port 2(bridge_slave_1) entered blocking state
[  162.550946][ T9025] bridge0: port 2(bridge_slave_1) entered disabled state
[  162.559154][ T9025] device bridge_slave_1 entered promiscuous mode
[  162.595005][ T9035] IPVS: ftp: loaded support on port[0] = 21
[  162.640348][ T9025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  162.652252][ T9025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  162.668921][ T9020] 8021q: adding VLAN 0 to HW filter on device batadv0
[  162.703869][ T9025] team0: Port device team_slave_0 added
[  162.748743][ T9025] team0: Port device team_slave_1 added
[  162.849926][ T9025] device hsr_slave_0 entered promiscuous mode
[  162.886982][ T9025] device hsr_slave_1 entered promiscuous mode
[  162.954728][ T9029] chnl_net:caif_netlink_parms(): no params data found
[  163.020144][ T9033] chnl_net:caif_netlink_parms(): no params data found
15:44:40 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  163.230416][    C1] hrtimer: interrupt took 29820 ns
[  163.319205][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.327401][ T9029] bridge0: port 1(bridge_slave_0) entered disabled state
[  163.336396][ T9029] device bridge_slave_0 entered promiscuous mode
[  163.359231][ T9033] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.366302][ T9033] bridge0: port 1(bridge_slave_0) entered disabled state
[  163.403576][ T9033] device bridge_slave_0 entered promiscuous mode
[  163.427373][ T9023] 8021q: adding VLAN 0 to HW filter on device bond0
[  163.454056][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.461500][ T9029] bridge0: port 2(bridge_slave_1) entered disabled state
[  163.477479][ T9029] device bridge_slave_1 entered promiscuous mode
[  163.486728][ T9033] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.501165][ T9033] bridge0: port 2(bridge_slave_1) entered disabled state
[  163.513747][ T9033] device bridge_slave_1 entered promiscuous mode
[  163.536028][ T9023] 8021q: adding VLAN 0 to HW filter on device team0
[  163.570154][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  163.583835][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  163.596129][ T9035] chnl_net:caif_netlink_parms(): no params data found
[  163.649010][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  163.665085][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  163.674689][ T9027] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.681811][ T9027] bridge0: port 1(bridge_slave_0) entered forwarding state
[  163.697137][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  163.706040][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  163.726899][   T26] kauditd_printk_skb: 3 callbacks suppressed
15:44:41 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  163.726913][   T26] audit: type=1800 audit(1562514280.987:31): pid=9049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=3 res=0
[  163.753922][ T9027] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.761051][ T9027] bridge0: port 2(bridge_slave_1) entered forwarding state
[  163.823400][ T9029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  163.838997][ T9033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  163.850824][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  163.859208][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  163.868170][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  163.878786][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  163.898043][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  163.914800][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  163.938702][ T9029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  163.950916][ T9033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  163.972876][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  163.988138][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  164.005521][ T9025] 8021q: adding VLAN 0 to HW filter on device bond0
[  164.070016][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  164.083312][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  164.096305][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  164.113071][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  164.142639][ T9029] team0: Port device team_slave_0 added
[  164.175826][ T9025] 8021q: adding VLAN 0 to HW filter on device team0
[  164.187028][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  164.215267][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  164.233328][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  164.245923][ T9029] team0: Port device team_slave_1 added
[  164.256181][ T9033] team0: Port device team_slave_0 added
[  164.273656][ T9035] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.283600][ T9035] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.291973][ T9035] device bridge_slave_0 entered promiscuous mode
[  164.311549][ T9035] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.324240][ T9035] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.334790][ T9035] device bridge_slave_1 entered promiscuous mode
[  164.350534][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  164.363370][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  164.375219][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.382351][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state
[  164.430337][ T9033] team0: Port device team_slave_1 added
[  164.465807][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  164.507307][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  164.516004][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  164.524752][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.531872][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state
15:44:41 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  164.554621][ T9023] 8021q: adding VLAN 0 to HW filter on device batadv0
[  164.610217][ T9029] device hsr_slave_0 entered promiscuous mode
[  164.665194][ T9029] device hsr_slave_1 entered promiscuous mode
[  164.753511][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  164.770278][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  164.841162][ T9033] device hsr_slave_0 entered promiscuous mode
[  164.897204][ T9033] device hsr_slave_1 entered promiscuous mode
[  164.958457][ T9035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  164.993868][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  165.011777][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  165.040450][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  165.055690][ T9074] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa
[  165.074658][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  165.088156][ T9074] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa
[  165.100642][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
15:44:42 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

[  165.143750][ T9025] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  165.163796][ T9025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  165.196397][ T9077] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa
[  165.217013][ T9035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  165.297388][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.312356][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
15:44:42 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

[  165.343611][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.359494][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.398526][ T9080] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa
[  165.415967][ T9025] 8021q: adding VLAN 0 to HW filter on device batadv0
15:44:42 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:42 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

[  165.458393][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  165.491895][ T9035] team0: Port device team_slave_0 added
[  165.508273][ T9035] team0: Port device team_slave_1 added
[  165.541400][ T9029] 8021q: adding VLAN 0 to HW filter on device bond0
[  165.554676][ T9085] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa
15:44:42 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

[  165.625581][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  165.663045][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  165.683294][ T9029] 8021q: adding VLAN 0 to HW filter on device team0
[  165.713165][ T9033] 8021q: adding VLAN 0 to HW filter on device bond0
[  165.769792][ T9035] device hsr_slave_0 entered promiscuous mode
[  165.813383][ T9035] device hsr_slave_1 entered promiscuous mode
[  165.898312][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  165.940770][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
15:44:43 executing program 2:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  165.987018][   T17] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.994108][   T17] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.032733][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.064094][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  166.089175][   T17] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.096316][   T17] bridge0: port 2(bridge_slave_1) entered forwarding state
[  166.138279][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  166.182846][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.203369][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.251082][ T9033] 8021q: adding VLAN 0 to HW filter on device team0
[  166.318358][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  166.326418][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  166.419705][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.432119][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.442009][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  166.457063][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  166.465757][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  166.482505][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  166.493149][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  166.514444][ T9029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  166.534394][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  166.551679][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  166.568581][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  166.588617][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.595759][ T3314] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.613444][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  166.624427][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  166.638993][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.653029][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  166.665163][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.672321][ T3314] bridge0: port 2(bridge_slave_1) entered forwarding state
[  166.707536][ T9029] 8021q: adding VLAN 0 to HW filter on device batadv0
[  166.736981][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  166.744991][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  166.784581][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  166.805523][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.824987][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.841763][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  166.869679][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  166.883807][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  166.895306][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  166.905177][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  166.916823][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  166.925213][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  166.946729][ T9033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  166.998302][ T9035] 8021q: adding VLAN 0 to HW filter on device bond0
[  167.021002][ T9033] 8021q: adding VLAN 0 to HW filter on device batadv0
[  167.053512][ T9035] 8021q: adding VLAN 0 to HW filter on device team0
[  167.078578][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  167.087547][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  167.127617][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  167.141361][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  167.152038][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state
[  167.159155][ T3314] bridge0: port 1(bridge_slave_0) entered forwarding state
[  167.168952][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  167.177826][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.193482][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.200629][ T3314] bridge0: port 2(bridge_slave_1) entered forwarding state
[  167.228678][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  167.254261][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  167.262881][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  167.272219][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  167.281582][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  167.290723][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  167.300220][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  167.309176][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  167.324415][ T9035] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  167.335656][ T9035] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  167.341513][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  167.362213][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  167.415138][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  167.429442][ T9124]  loop3: p1 < > p4
[  167.441247][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  167.458545][ T9124] loop3: partition table partially beyond EOD, truncated
[  167.480165][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  167.482006][ T9124] loop3: p1 size 2 extends beyond EOD, truncated
[  167.496239][ T9035] 8021q: adding VLAN 0 to HW filter on device batadv0
[  167.522995][ T9124] loop3: p4 start 1854537728 is beyond EOD, truncated
15:44:45 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)

15:44:45 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

15:44:45 executing program 3:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:45 executing program 2:

15:44:45 executing program 4:

15:44:45 executing program 5:

15:44:45 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

15:44:45 executing program 2:

15:44:45 executing program 4:

15:44:45 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:45 executing program 1:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:45 executing program 3:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  168.495199][ T9179]  loop5: p1 < > p4
[  168.575222][ T9179] loop5: p4 start 1854537728 is beyond EOD, truncated
15:44:46 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)

15:44:46 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x50000}]})
epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffff9c, 0x1, 0xffffffffffffffff, &(0x7f0000000080))

15:44:46 executing program 4:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700"/70, 0x46, 0x1a0}])

15:44:46 executing program 1:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:46 executing program 3:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:46 executing program 1:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:46 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:46 executing program 2:
clock_gettime(0xfffffffffffffffc, &(0x7f00000001c0))

15:44:46 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

15:44:46 executing program 2:
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:46 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

[  169.371520][ T9228]  loop5: p1 < > p4
15:44:46 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)

15:44:46 executing program 3:

15:44:46 executing program 4:

[  169.516463][ T9228] loop5: p4 start 1854537728 is beyond EOD, truncated
15:44:46 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

15:44:47 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0)

15:44:47 executing program 4:

15:44:47 executing program 3:

15:44:47 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:47 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:47 executing program 4:

15:44:47 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0)

15:44:47 executing program 2:

15:44:47 executing program 3:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
syz_emit_ethernet(0x1aa, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0)

15:44:47 executing program 2:
syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)={[{@usrjquota_file='usrjquota=syz'}, {@expose_privroot='expose_privroot'}]})

15:44:47 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0)

15:44:47 executing program 3:

15:44:47 executing program 4:

[  170.412798][ T9296]  loop5: p1 < > p4
15:44:47 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:47 executing program 4:

[  170.480358][ T9300] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option ""
[  170.523438][ T9296] loop5: p4 start 1854537728 is beyond EOD, truncated
15:44:48 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0)

15:44:48 executing program 3:

15:44:48 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:48 executing program 4:

[  170.712449][ T9300] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option ""
15:44:48 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0)

15:44:48 executing program 2:

15:44:48 executing program 3:

15:44:48 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:48 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  170.991783][ T9329]  loop5: p1 < > p4
15:44:48 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0)

[  171.025145][ T9329] loop5: p4 start 1854537728 is beyond EOD, truncated
15:44:48 executing program 3:
syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x689, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0)

15:44:48 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0)

15:44:48 executing program 2:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900042f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

15:44:48 executing program 3:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  171.424655][ T9349]  loop4: p1 < > p4
[  171.470085][ T9349] loop4: partition table partially beyond EOD, truncated
[  171.550354][ T9349] loop4: p1 size 2 extends beyond EOD, truncated
15:44:48 executing program 5:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900443c00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

15:44:48 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:48 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0)

15:44:48 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  171.667429][ T9349] loop4: p4 start 1854537728 is beyond EOD, truncated
15:44:49 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0)

[  171.740267][ T9367]  loop3: p1 < > p4
[  171.744201][ T9367] loop3: partition table partially beyond EOD, truncated
[  171.790916][ T9367] loop3: p1 size 2 extends beyond EOD, truncated
[  171.844336][ T9367] loop3: p4 start 1854537728 is beyond EOD, truncated
15:44:49 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:49 executing program 4:

15:44:49 executing program 2:

15:44:49 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:49 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0)

15:44:49 executing program 3:

15:44:49 executing program 2:

15:44:49 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x0, 0x0)

15:44:49 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0)

[  172.351123][ T9408]  loop5: p1 < > p4
15:44:49 executing program 3:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:44:49 executing program 2:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900042f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

[  172.473822][ T9408] loop5: p4 start 1854537728 is beyond EOD, truncated
15:44:49 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0)

15:44:50 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:50 executing program 2:
syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff87, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0)

15:44:50 executing program 3:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:44:50 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0)

15:44:50 executing program 3:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:44:50 executing program 2:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442100fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

15:44:50 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:50 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x0, &(0x7f0000000480))

15:44:50 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:50 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0)

15:44:50 executing program 3:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:44:50 executing program 2:

15:44:50 executing program 3:
syz_emit_ethernet(0x0, 0x0, 0x0)

15:44:50 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0)

15:44:50 executing program 4:

15:44:50 executing program 3:
syz_emit_ethernet(0x0, 0x0, 0x0)

15:44:50 executing program 5:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:50 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0)

15:44:51 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:51 executing program 2:

15:44:51 executing program 4:

15:44:51 executing program 3:
syz_emit_ethernet(0x0, 0x0, 0x0)

15:44:51 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0)

15:44:51 executing program 5:

15:44:51 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:51 executing program 4:
keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={'digest_null\x00'}})

15:44:51 executing program 5:
shmget(0x3, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil)

15:44:51 executing program 1:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0)

15:44:51 executing program 4:

15:44:51 executing program 3:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:51 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  174.326301][ T9541]  loop2: p1 < > p4
15:44:51 executing program 5:

[  174.439971][ T9541] loop2: p4 start 1854537728 is beyond EOD, truncated
15:44:51 executing program 3:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:51 executing program 4:

15:44:52 executing program 3:
syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0)

15:44:52 executing program 4:

15:44:52 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:52 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x100000000009e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x7080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

15:44:52 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:52 executing program 1:

15:44:52 executing program 4:

15:44:52 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

15:44:52 executing program 1:
socket(0x1e, 0x4, 0x0)
syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x9, 0x40000)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f00000007c0)="f6cc794476c9f8cd1a7ef93c41166e229bd579c42f5e0ea46e819f7fe0b9f693aea860a3658a0d0db11dd627065718a3875dcf63ef6b1d7f8897fec56be2fa3f6e221c1aa76447c43acea60cd55285d352f8e7e6bb54cb7d0435fcbe335eafe9a2fdd801b2df2e4a638da47e63bd95c979caca89d70c9b7631fc1c12c0d9dd44786b42e7931a834bd8beec202cddbad89ee2b8b14e42fbf0092e2d601757f148c6728a2e12a9f4bf5292531ef78a11ee", 0x0}, 0x18)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000000300), 0x10)
ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x3131354f, 0x3, @stepwise={0x3924, 0x6, 0x0, 0x0, 0x0, 0xd7e}})
sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getpgrp(0x0)
mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9)
setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4)
getrandom(0x0, 0x0, 0x3)
setpriority(0x0, 0x0, 0xffff)
ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000000c0)={0x4, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]})
open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1)
clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff)
execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', 0x0])

15:44:52 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:52 executing program 4:
syz_emit_ethernet(0x4e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd604b829600183a006802fbd444d11671f881ea00000000ffff000000000000005fa2120500"/78], &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x306]})

15:44:52 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

15:44:52 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:52 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0)

15:44:52 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:52 executing program 1:
unshare(0x24020400)
openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)

15:44:52 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  175.710237][ T9612]  loop2: p1 < > p4
15:44:53 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0)

[  175.824288][ T9612] loop2: p4 start 1854537728 is beyond EOD, truncated
15:44:53 executing program 1:

15:44:53 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:53 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0)

[  176.153559][ T9652]  loop4: p1 < > p4
15:44:53 executing program 2:

15:44:53 executing program 1:

[  176.290603][ T9652] loop4: p4 start 1854537728 is beyond EOD, truncated
15:44:53 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0)

15:44:53 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:53 executing program 1:

15:44:53 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:53 executing program 2:

15:44:53 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:53 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0)

15:44:54 executing program 1:

15:44:54 executing program 2:

15:44:54 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0)

15:44:54 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:54 executing program 2:
syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')

15:44:54 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

[  177.210812][ T9701]  loop4: p1 < > p4
15:44:54 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:54 executing program 5:
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:54 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0)

[  177.282596][ T9701] loop4: p4 start 1854537728 is beyond EOD, truncated
15:44:54 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

[  177.695290][ T9738]  loop2: p1 < > p4
15:44:55 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:55 executing program 1:

15:44:55 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0)

15:44:55 executing program 5:
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:55 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:55 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0)

[  177.841551][ T9738] loop2: p4 start 1854537728 is beyond EOD, truncated
15:44:55 executing program 5:
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:55 executing program 1:

15:44:55 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0)

15:44:55 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:55 executing program 1:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(0x0, &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}])

15:44:55 executing program 5:
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:55 executing program 4:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:55 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:55 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0)

15:44:55 executing program 5:
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:55 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0)

15:44:55 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:56 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0)

15:44:56 executing program 5:
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:56 executing program 1:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:56 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0)

[  178.979313][ T9801]  loop4: p1 < > p4
15:44:56 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:56 executing program 1:

[  179.050240][ T9801] loop4: p4 start 1854537728 is beyond EOD, truncated
15:44:56 executing program 4:
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000004c0))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0x0, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)

15:44:56 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:56 executing program 2:
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:56 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0)

15:44:56 executing program 1:

15:44:56 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:56 executing program 1:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0)

15:44:56 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0)

15:44:56 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:56 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0)

[  179.531926][ T9867] ip6_tunnel: non-ECT from fe80:0000:8000:0000:0000:0000:0000:00aa with DS=0xa
[  179.566273][ T9867] ip6_tunnel: non-ECT from fe80:0000:8000:0000:0000:0000:0000:00aa with DS=0xa
[  179.650767][   T26] audit: type=1800 audit(1562514296.907:32): pid=9863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16609 res=0
15:44:56 executing program 1:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0)

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:57 executing program 4:
syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:44:57 executing program 2:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:57 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0)

15:44:57 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:57 executing program 3:
syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0)

15:44:57 executing program 4:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:57 executing program 1:

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:57 executing program 2:

[  180.331990][   T26] audit: type=1800 audit(1562514297.597:33): pid=9911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16602 res=0
15:44:57 executing program 3:

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:57 executing program 1:

15:44:57 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:58 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:58 executing program 1:

15:44:58 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
truncate(&(0x7f0000000240)='./file0\x00', 0x0)

15:44:58 executing program 2:

[  180.761918][ T9925]  loop4: p1 < > p4
[  180.888580][ T9925] loop4: p4 start 1854537728 is beyond EOD, truncated
[  181.103833][   T26] audit: type=1800 audit(1562514298.367:34): pid=9956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16620 res=0
15:44:58 executing program 4:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:58 executing program 1:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x0, 0x0)

15:44:58 executing program 2:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x0, &(0x7f0000000480))

15:44:58 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:58 executing program 3:
stat(&(0x7f0000000000)='./file0\x00', 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:58 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:58 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:58 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

[  181.626034][ T9980]  loop3: p1 < > p4
[  181.642281][ T9980] loop3: partition table partially beyond EOD, truncated
[  181.661768][ T9980] loop3: p1 size 2 extends beyond EOD, truncated
[  181.705587][ T9980] loop3: p4 start 1854537728 is beyond EOD, truncated
15:44:59 executing program 1:

15:44:59 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:44:59 executing program 4:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:59 executing program 1:

15:44:59 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000006703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:44:59 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:44:59 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, 0x0, 0x0)

15:44:59 executing program 1:
syz_emit_ethernet(0xff1f, &(0x7f0000000200)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xff000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0)

[  182.158518][T10015]  loop3: p1 < > p4
[  182.166576][T10015] loop3: partition table partially beyond EOD, truncated
[  182.204268][T10015] loop3: p1 size 2 extends beyond EOD, truncated
[  182.218716][T10015] loop3: p4 start 1854537728 is beyond EOD, truncated
15:44:59 executing program 2:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
msgget$private(0x0, 0x0)
msgsnd(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="01"], 0x1, 0x0)

15:44:59 executing program 1:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x44, 0x11, 0x0, @empty, @empty={[0x0, 0x0, 0x0, 0xc00c0000]}, {[], @gre}}}}}, 0x0)

15:44:59 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, 0x0, 0x0)

15:44:59 executing program 3:
stat(&(0x7f0000000000)='./file0\x00', 0x0)
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:59 executing program 4:
syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_KEEPCAPS(0x8, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0)
geteuid()
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100))
geteuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])

15:44:59 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, 0x0, 0x0)

15:44:59 executing program 2:

15:44:59 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
io_getevents(0x0, 0x0, 0x0, 0x0, 0x0)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  182.628661][T10051]  loop3: p1 < > p4
[  182.652357][T10051] loop3: partition table partially beyond EOD, truncated
[  182.704169][T10051] loop3: p1 size 2 extends beyond EOD, truncated
15:45:00 executing program 2:

15:45:00 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:45:00 executing program 1:

[  182.794125][T10051] loop3: p4 start 1854537728 is beyond EOD, truncated
[  182.959253][T10057]  loop4: p1 < > p4
15:45:00 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:45:00 executing program 2:

15:45:00 executing program 1:

15:45:00 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

[  183.063159][T10057] loop4: p4 start 1854537728 is beyond EOD, truncated
15:45:00 executing program 3:

15:45:00 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000000500000065000000000000009500000000000000"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e)

15:45:00 executing program 2:

15:45:00 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:45:00 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000002403000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:45:00 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00')

15:45:00 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:45:00 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004003000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:45:00 executing program 1:
syz_emit_ethernet(0x155, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6081182e00442f00fe80000000000000000000000015b52d1eacbbb5c0451cf60000aafe8000000000000000000000000000aa042065580000000000000800000086dd88ca88be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0)

15:45:00 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:45:01 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1)
setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0)
ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)
ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, 0x0)
clock_gettime(0x2, &(0x7f0000000140))

15:45:01 executing program 0:
mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00')
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6})
ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff})
ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd)
chroot(0x0)
setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0)
semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580))
getpgrp(0xffffffffffffffff)
gettid()
syz_open_procfs(0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
semctl$SETVAL(0x0, 0x0, 0x10, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff)
open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f})
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9)
truncate(&(0x7f0000000240)='./file0\x00', 0x90002)
lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000)

15:45:01 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

15:45:01 executing program 4:

15:45:01 executing program 1:

15:45:01 executing program 2:

15:45:01 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004603000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:45:01 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0x10, 0x0, 0xbdab)

15:45:01 executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004503000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)

15:45:01 executing program 2:

15:45:01 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c)

[  184.422166][T10150] ------------[ cut here ]------------
[  184.463263][T10150] verifier backtracking bug
[  184.463422][T10150] WARNING: CPU: 1 PID: 10150 at kernel/bpf/verifier.c:1755 mark_chain_precision+0x15c2/0x18e0
[  184.479680][T10150] Kernel panic - not syncing: panic_on_warn set ...
[  184.486285][T10150] CPU: 1 PID: 10150 Comm: syz-executor.3 Not tainted 5.2.0-rc7-next-20190703 #28
[  184.495398][T10150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  184.505468][T10150] Call Trace:
[  184.508776][T10150]  dump_stack+0x172/0x1f0
[  184.513123][T10150]  ? mark_chain_precision+0x1520/0x18e0
[  184.518691][T10150]  panic+0x2dc/0x755
[  184.522643][T10150]  ? add_taint.cold+0x16/0x16
[  184.527340][T10150]  ? kasan_check_write+0x14/0x20
[  184.532317][T10150]  ? __warn.cold+0x5/0x4c
[  184.536682][T10150]  ? mark_chain_precision+0x15c2/0x18e0
[  184.542238][T10150]  __warn.cold+0x20/0x4c
[  184.546492][T10150]  ? mark_chain_precision+0x15c2/0x18e0
[  184.552050][T10150]  report_bug+0x263/0x2b0
[  184.556388][T10150]  do_error_trap+0x11b/0x200
[  184.560990][T10150]  do_invalid_op+0x37/0x50
[  184.565412][T10150]  ? mark_chain_precision+0x15c2/0x18e0
[  184.570964][T10150]  invalid_op+0x14/0x20
[  184.575125][T10150] RIP: 0010:mark_chain_precision+0x15c2/0x18e0
[  184.581277][T10150] Code: e9 55 f2 ff ff 48 89 df e8 5b c9 2c 00 e9 3a f3 ff ff e8 21 a7 f2 ff 48 c7 c7 60 9d 91 87 c6 05 1e f8 1f 08 01 e8 96 1f c4 ff <0f> 0b 41 be f2 ff ff ff e9 eb f7 ff ff e8 fc a6 f2 ff 45 31 f6 e9
[  184.600889][T10150] RSP: 0018:ffff88805ed57378 EFLAGS: 00010282
[  184.606961][T10150] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  184.614955][T10150] RDX: 000000000000b939 RSI: ffffffff815c0c96 RDI: ffffed100bdaae61
[  184.622944][T10150] RBP: ffff88805ed574d0 R08: ffff888096a4e580 R09: 0000000000000000
[  184.630921][T10150] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  184.638901][T10150] R13: ffff888063546a00 R14: 0000000000000001 R15: dffffc0000000000
[  184.646921][T10150]  ? vprintk_func+0x86/0x189
[  184.651534][T10150]  ? mark_chain_precision+0x15c2/0x18e0
[  184.657127][T10150]  ? mark_reg_unknown+0x50/0x50
[  184.661989][T10150]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  184.667809][T10150]  ? bpf_verifier_log_write+0x240/0x240
[  184.673380][T10150]  ? check_reg_arg+0x1f1/0x480
[  184.678458][T10150]  check_cond_jmp_op+0xcce/0x3c20
[  184.683496][T10150]  ? security_capable+0x95/0xc0
[  184.688368][T10150]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  184.694015][T10150]  ? find_held_lock+0x35/0x130
[  184.698795][T10150]  ? __sanitizer_cov_trace_const_cmp2+0x1d/0x20
[  184.705055][T10150]  ? check_func_arg+0x11b0/0x11b0
[  184.710097][T10150]  ? fault_create_debugfs_attr+0x180/0x180
[  184.715911][T10150]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  184.722153][T10150]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  184.728402][T10150]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  184.734646][T10150]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  184.740897][T10150]  ? krealloc+0x7b/0xd0
[  184.745053][T10150]  ? krealloc+0x7b/0xd0
[  184.749221][T10150]  ? rcu_read_lock_sched_held+0x110/0x130
[  184.755028][T10150]  ? kfree+0x28b/0x2c0
[  184.759098][T10150]  do_check+0x6187/0x8990
[  184.763428][T10150]  ? find_held_lock+0x35/0x130
[  184.768215][T10150]  ? check_helper_call+0x3210/0x3210
[  184.773499][T10150]  ? kfree+0x226/0x2c0
[  184.777566][T10150]  ? kvfree+0x61/0x70
[  184.781561][T10150]  ? kfree+0x226/0x2c0
[  184.785638][T10150]  ? lockdep_hardirqs_on+0x418/0x5d0
[  184.790935][T10150]  ? trace_hardirqs_on+0x67/0x240
[  184.795960][T10150]  ? kvfree+0x61/0x70
[  184.799950][T10150]  bpf_check+0x6f99/0x9948
[  184.804378][T10150]  ? do_check+0x8990/0x8990
[  184.808883][T10150]  ? lock_downgrade+0x920/0x920
[  184.813733][T10150]  ? ktime_get_with_offset+0x13a/0x350
[  184.819189][T10150]  ? bpf_prog_load+0xdce/0x1670
[  184.824031][T10150]  ? ktime_get_with_offset+0x13a/0x350
[  184.829492][T10150]  ? lockdep_hardirqs_on+0x418/0x5d0
[  184.834783][T10150]  ? trace_hardirqs_on+0x67/0x240
[  184.839838][T10150]  ? memset+0x32/0x40
[  184.843826][T10150]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  184.850065][T10150]  ? bpf_obj_name_cpy+0x13f/0x190
[  184.855093][T10150]  bpf_prog_load+0xe68/0x1670
[  184.859776][T10150]  ? bpf_prog_new_fd+0x60/0x60
[  184.864543][T10150]  ? lock_downgrade+0x920/0x920
[  184.869435][T10150]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  184.875677][T10150]  ? security_bpf+0x8b/0xc0
[  184.880188][T10150]  __do_sys_bpf+0xa46/0x42f0
[  184.884784][T10150]  ? bpf_prog_load+0x1670/0x1670
[  184.889734][T10150]  ? kasan_check_read+0x11/0x20
[  184.894589][T10150]  ? _copy_to_user+0x118/0x160
[  184.899355][T10150]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  184.905593][T10150]  ? put_timespec64+0xda/0x140
[  184.910350][T10150]  ? nsecs_to_jiffies+0x30/0x30
[  184.915209][T10150]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  184.920669][T10150]  ? do_syscall_64+0x26/0x6a0
[  184.925339][T10150]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  184.931405][T10150]  ? do_syscall_64+0x26/0x6a0
[  184.936092][T10150]  __x64_sys_bpf+0x73/0xb0
[  184.940516][T10150]  do_syscall_64+0xfd/0x6a0
[  184.945023][T10150]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  184.950911][T10150] RIP: 0033:0x4597c9
[  184.954804][T10150] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  184.974411][T10150] RSP: 002b:00007f1988ea9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[  184.982831][T10150] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9
[  184.990986][T10150] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005
[  184.998960][T10150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  185.006930][T10150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1988eaa6d4
[  185.014902][T10150] R13: 00000000004bfc12 R14: 00000000004d15f8 R15: 00000000ffffffff
[  185.024019][T10150] Kernel Offset: disabled
[  185.028407][T10150] Rebooting in 86400 seconds..