[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. [ 60.524252][ T26] audit: type=1800 audit(1562514177.787:25): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.547773][ T26] audit: type=1800 audit(1562514177.787:26): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.599592][ T26] audit: type=1800 audit(1562514177.787:27): pid=8854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts. 2019/07/07 15:43:08 fuzzer started 2019/07/07 15:43:11 dialing manager at 10.128.0.26:34903 2019/07/07 15:43:11 syscalls: 2465 2019/07/07 15:43:11 code coverage: enabled 2019/07/07 15:43:11 comparison tracing: enabled 2019/07/07 15:43:11 extra coverage: extra coverage is not supported by the kernel 2019/07/07 15:43:11 setuid sandbox: enabled 2019/07/07 15:43:11 namespace sandbox: enabled 2019/07/07 15:43:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/07 15:43:11 fault injection: enabled 2019/07/07 15:43:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/07 15:43:11 net packet injection: enabled 2019/07/07 15:43:11 net device setup: enabled 15:44:38 executing program 0: syzkaller login: [ 160.839047][ T9020] IPVS: ftp: loaded support on port[0] = 21 15:44:38 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) [ 161.001074][ T9020] chnl_net:caif_netlink_parms(): no params data found [ 161.043043][ T9023] IPVS: ftp: loaded support on port[0] = 21 [ 161.076246][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.084026][ T9020] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.092322][ T9020] device bridge_slave_0 entered promiscuous mode [ 161.103123][ T9020] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.110304][ T9020] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.118497][ T9020] device bridge_slave_1 entered promiscuous mode [ 161.163692][ T9020] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.178372][ T9020] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.211770][ T9020] team0: Port device team_slave_0 added [ 161.220609][ T9020] team0: Port device team_slave_1 added 15:44:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000006000000360000000000000073003500000000009500000000000000cd8c5d02275bb0c9d0cfc95fd09bcf893b8394e854914adf72e0ee561f14bf04056ade69079367c47d1e4f44ce5fb533c97d68bb76268f3b41cb484b731f0e7a209941f9a7fb0df64e4d17aecd39"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 161.309647][ T9020] device hsr_slave_0 entered promiscuous mode [ 161.366984][ T9020] device hsr_slave_1 entered promiscuous mode [ 161.449555][ T9025] IPVS: ftp: loaded support on port[0] = 21 [ 161.463216][ T9020] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.470456][ T9020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.478250][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.485329][ T9020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.501875][ T9023] chnl_net:caif_netlink_parms(): no params data found 15:44:38 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 161.650476][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.666667][ T9023] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.689203][ T9023] device bridge_slave_0 entered promiscuous mode [ 161.705606][ T9023] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.715694][ T9023] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.724030][ T9023] device bridge_slave_1 entered promiscuous mode [ 161.779013][ T9029] IPVS: ftp: loaded support on port[0] = 21 [ 161.781434][ T9020] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.816262][ T9023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.845482][ T9025] chnl_net:caif_netlink_parms(): no params data found [ 161.870403][ T9020] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.879839][ T9023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:44:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900032f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) [ 161.895910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.909790][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.931378][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.942940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 162.047749][ T9023] team0: Port device team_slave_0 added [ 162.065377][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.075446][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.082578][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.095765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.110313][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.117467][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.138829][ T9023] team0: Port device team_slave_1 added [ 162.144963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.157813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.179872][ T9033] IPVS: ftp: loaded support on port[0] = 21 [ 162.210967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.227483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.236245][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.248912][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:44:39 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 162.260154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.273383][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.283448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.311319][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.389903][ T9023] device hsr_slave_0 entered promiscuous mode [ 162.457269][ T9023] device hsr_slave_1 entered promiscuous mode [ 162.519957][ T9025] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.528283][ T9025] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.535886][ T9025] device bridge_slave_0 entered promiscuous mode [ 162.543726][ T9025] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.550946][ T9025] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.559154][ T9025] device bridge_slave_1 entered promiscuous mode [ 162.595005][ T9035] IPVS: ftp: loaded support on port[0] = 21 [ 162.640348][ T9025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.652252][ T9025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.668921][ T9020] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.703869][ T9025] team0: Port device team_slave_0 added [ 162.748743][ T9025] team0: Port device team_slave_1 added [ 162.849926][ T9025] device hsr_slave_0 entered promiscuous mode [ 162.886982][ T9025] device hsr_slave_1 entered promiscuous mode [ 162.954728][ T9029] chnl_net:caif_netlink_parms(): no params data found [ 163.020144][ T9033] chnl_net:caif_netlink_parms(): no params data found 15:44:40 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 163.230416][ C1] hrtimer: interrupt took 29820 ns [ 163.319205][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.327401][ T9029] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.336396][ T9029] device bridge_slave_0 entered promiscuous mode [ 163.359231][ T9033] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.366302][ T9033] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.403576][ T9033] device bridge_slave_0 entered promiscuous mode [ 163.427373][ T9023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.454056][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.461500][ T9029] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.477479][ T9029] device bridge_slave_1 entered promiscuous mode [ 163.486728][ T9033] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.501165][ T9033] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.513747][ T9033] device bridge_slave_1 entered promiscuous mode [ 163.536028][ T9023] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.570154][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.583835][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.596129][ T9035] chnl_net:caif_netlink_parms(): no params data found [ 163.649010][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.665085][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.674689][ T9027] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.681811][ T9027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.697137][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.706040][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.726899][ T26] kauditd_printk_skb: 3 callbacks suppressed 15:44:41 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 163.726913][ T26] audit: type=1800 audit(1562514280.987:31): pid=9049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=3 res=0 [ 163.753922][ T9027] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.761051][ T9027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.823400][ T9029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.838997][ T9033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.850824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.859208][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.868170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.878786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.898043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.914800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.938702][ T9029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.950916][ T9033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.972876][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.988138][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.005521][ T9025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.070016][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.083312][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.096305][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.113071][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.142639][ T9029] team0: Port device team_slave_0 added [ 164.175826][ T9025] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.187028][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.215267][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.233328][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.245923][ T9029] team0: Port device team_slave_1 added [ 164.256181][ T9033] team0: Port device team_slave_0 added [ 164.273656][ T9035] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.283600][ T9035] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.291973][ T9035] device bridge_slave_0 entered promiscuous mode [ 164.311549][ T9035] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.324240][ T9035] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.334790][ T9035] device bridge_slave_1 entered promiscuous mode [ 164.350534][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.363370][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.375219][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.382351][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.430337][ T9033] team0: Port device team_slave_1 added [ 164.465807][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.507307][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.516004][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.524752][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.531872][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state 15:44:41 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 164.554621][ T9023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.610217][ T9029] device hsr_slave_0 entered promiscuous mode [ 164.665194][ T9029] device hsr_slave_1 entered promiscuous mode [ 164.753511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.770278][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.841162][ T9033] device hsr_slave_0 entered promiscuous mode [ 164.897204][ T9033] device hsr_slave_1 entered promiscuous mode [ 164.958457][ T9035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.993868][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.011777][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.040450][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.055690][ T9074] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa [ 165.074658][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.088156][ T9074] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa [ 165.100642][ T9067] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:44:42 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) [ 165.143750][ T9025] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.163796][ T9025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.196397][ T9077] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa [ 165.217013][ T9035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.297388][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.312356][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 15:44:42 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) [ 165.343611][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.359494][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.398526][ T9080] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa [ 165.415967][ T9025] 8021q: adding VLAN 0 to HW filter on device batadv0 15:44:42 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:42 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) [ 165.458393][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.491895][ T9035] team0: Port device team_slave_0 added [ 165.508273][ T9035] team0: Port device team_slave_1 added [ 165.541400][ T9029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.554676][ T9085] ip6_tunnel: non-ECT from fe80:0000:8000:0034:0000:0000:0000:00aa with DS=0xa 15:44:42 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) [ 165.625581][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.663045][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.683294][ T9029] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.713165][ T9033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.769792][ T9035] device hsr_slave_0 entered promiscuous mode [ 165.813383][ T9035] device hsr_slave_1 entered promiscuous mode [ 165.898312][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.940770][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:44:43 executing program 2: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 165.987018][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.994108][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.032733][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.064094][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.089175][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.096316][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.138279][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.182846][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.203369][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.251082][ T9033] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.318358][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.326418][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.419705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.432119][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.442009][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.457063][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.465757][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.482505][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.493149][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.514444][ T9029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.534394][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.551679][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.568581][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.588617][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.595759][ T3314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.613444][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.624427][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.638993][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.653029][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.665163][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.672321][ T3314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.707536][ T9029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.736981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.744991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.784581][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.805523][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.824987][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.841763][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.869679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.883807][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.895306][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.905177][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.916823][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.925213][ T9027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.946729][ T9033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.998302][ T9035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.021002][ T9033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.053512][ T9035] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.078578][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.087547][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.127617][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.141361][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.152038][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.159155][ T3314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.168952][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.177826][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.193482][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.200629][ T3314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.228678][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.254261][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.262881][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.272219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.281582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.290723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.300220][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.309176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.324415][ T9035] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.335656][ T9035] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.341513][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.362213][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.415138][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.429442][ T9124] loop3: p1 < > p4 [ 167.441247][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.458545][ T9124] loop3: partition table partially beyond EOD, truncated [ 167.480165][ T3314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.482006][ T9124] loop3: p1 size 2 extends beyond EOD, truncated [ 167.496239][ T9035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.522995][ T9124] loop3: p4 start 1854537728 is beyond EOD, truncated 15:44:45 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) 15:44:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 15:44:45 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:45 executing program 2: 15:44:45 executing program 4: 15:44:45 executing program 5: 15:44:45 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 15:44:45 executing program 2: 15:44:45 executing program 4: 15:44:45 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:45 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:45 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 168.495199][ T9179] loop5: p1 < > p4 [ 168.575222][ T9179] loop5: p4 start 1854537728 is beyond EOD, truncated 15:44:46 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) 15:44:46 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x50000}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffff9c, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 15:44:46 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700"/70, 0x46, 0x1a0}]) 15:44:46 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:46 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:46 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:46 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:46 executing program 2: clock_gettime(0xfffffffffffffffc, &(0x7f00000001c0)) 15:44:46 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 15:44:46 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:46 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 169.371520][ T9228] loop5: p1 < > p4 15:44:46 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) 15:44:46 executing program 3: 15:44:46 executing program 4: [ 169.516463][ T9228] loop5: p4 start 1854537728 is beyond EOD, truncated 15:44:46 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 15:44:47 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0) 15:44:47 executing program 4: 15:44:47 executing program 3: 15:44:47 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:47 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:47 executing program 4: 15:44:47 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0) 15:44:47 executing program 2: 15:44:47 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) 15:44:47 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)={[{@usrjquota_file='usrjquota=syz'}, {@expose_privroot='expose_privroot'}]}) 15:44:47 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000"/53], 0x0) 15:44:47 executing program 3: 15:44:47 executing program 4: [ 170.412798][ T9296] loop5: p1 < > p4 15:44:47 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:47 executing program 4: [ 170.480358][ T9300] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" [ 170.523438][ T9296] loop5: p4 start 1854537728 is beyond EOD, truncated 15:44:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0) 15:44:48 executing program 3: 15:44:48 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:48 executing program 4: [ 170.712449][ T9300] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" 15:44:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0) 15:44:48 executing program 2: 15:44:48 executing program 3: 15:44:48 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:48 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 170.991783][ T9329] loop5: p1 < > p4 15:44:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb0000"], 0x0) [ 171.025145][ T9329] loop5: p4 start 1854537728 is beyond EOD, truncated 15:44:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x689, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 15:44:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0) 15:44:48 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900042f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) 15:44:48 executing program 3: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 171.424655][ T9349] loop4: p1 < > p4 [ 171.470085][ T9349] loop4: partition table partially beyond EOD, truncated [ 171.550354][ T9349] loop4: p1 size 2 extends beyond EOD, truncated 15:44:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900443c00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) 15:44:48 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:48 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0) 15:44:48 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 171.667429][ T9349] loop4: p4 start 1854537728 is beyond EOD, truncated 15:44:49 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000"], 0x0) [ 171.740267][ T9367] loop3: p1 < > p4 [ 171.744201][ T9367] loop3: partition table partially beyond EOD, truncated [ 171.790916][ T9367] loop3: p1 size 2 extends beyond EOD, truncated [ 171.844336][ T9367] loop3: p4 start 1854537728 is beyond EOD, truncated 15:44:49 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:49 executing program 4: 15:44:49 executing program 2: 15:44:49 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:49 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0) 15:44:49 executing program 3: 15:44:49 executing program 2: 15:44:49 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) 15:44:49 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0) [ 172.351123][ T9408] loop5: p1 < > p4 15:44:49 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:44:49 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900042f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 172.473822][ T9408] loop5: p4 start 1854537728 is beyond EOD, truncated 15:44:49 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800"], 0x0) 15:44:50 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:50 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff87, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 15:44:50 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:44:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0) 15:44:50 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:44:50 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442100fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) 15:44:50 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:50 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x0, &(0x7f0000000480)) 15:44:50 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0) 15:44:50 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:44:50 executing program 2: 15:44:50 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:44:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800"], 0x0) 15:44:50 executing program 4: 15:44:50 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:44:50 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0) 15:44:51 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:51 executing program 2: 15:44:51 executing program 4: 15:44:51 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 15:44:51 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0) 15:44:51 executing program 5: 15:44:51 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:51 executing program 4: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={'digest_null\x00'}}) 15:44:51 executing program 5: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 15:44:51 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000003400000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb000000000800000002000000000000000000000008006558000000"], 0x0) 15:44:51 executing program 4: 15:44:51 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:51 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 174.326301][ T9541] loop2: p1 < > p4 15:44:51 executing program 5: [ 174.439971][ T9541] loop2: p4 start 1854537728 is beyond EOD, truncated 15:44:51 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:51 executing program 4: 15:44:52 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) 15:44:52 executing program 4: 15:44:52 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:52 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x100000000009e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:44:52 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:52 executing program 1: 15:44:52 executing program 4: 15:44:52 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 15:44:52 executing program 1: socket(0x1e, 0x4, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x9, 0x40000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f00000007c0)="f6cc794476c9f8cd1a7ef93c41166e229bd579c42f5e0ea46e819f7fe0b9f693aea860a3658a0d0db11dd627065718a3875dcf63ef6b1d7f8897fec56be2fa3f6e221c1aa76447c43acea60cd55285d352f8e7e6bb54cb7d0435fcbe335eafe9a2fdd801b2df2e4a638da47e63bd95c979caca89d70c9b7631fc1c12c0d9dd44786b42e7931a834bd8beec202cddbad89ee2b8b14e42fbf0092e2d601757f148c6728a2e12a9f4bf5292531ef78a11ee", 0x0}, 0x18) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000300), 0x10) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x3131354f, 0x3, @stepwise={0x3924, 0x6, 0x0, 0x0, 0x0, 0xd7e}}) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) getrandom(0x0, 0x0, 0x3) setpriority(0x0, 0x0, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000000c0)={0x4, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', 0x0]) 15:44:52 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:52 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd604b829600183a006802fbd444d11671f881ea00000000ffff000000000000005fa2120500"/78], &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x306]}) 15:44:52 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 15:44:52 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:52 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 15:44:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:52 executing program 1: unshare(0x24020400) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 15:44:52 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 175.710237][ T9612] loop2: p1 < > p4 15:44:53 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0) [ 175.824288][ T9612] loop2: p4 start 1854537728 is beyond EOD, truncated 15:44:53 executing program 1: 15:44:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:53 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0) [ 176.153559][ T9652] loop4: p1 < > p4 15:44:53 executing program 2: 15:44:53 executing program 1: [ 176.290603][ T9652] loop4: p4 start 1854537728 is beyond EOD, truncated 15:44:53 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000"/53], 0x0) 15:44:53 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:53 executing program 1: 15:44:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:53 executing program 2: 15:44:53 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:53 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0) 15:44:54 executing program 1: 15:44:54 executing program 2: 15:44:54 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0) 15:44:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:54 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') 15:44:54 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 177.210812][ T9701] loop4: p1 < > p4 15:44:54 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:54 executing program 5: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:54 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb0000"], 0x0) [ 177.282596][ T9701] loop4: p4 start 1854537728 is beyond EOD, truncated 15:44:54 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) [ 177.695290][ T9738] loop2: p1 < > p4 15:44:55 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:55 executing program 1: 15:44:55 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0) 15:44:55 executing program 5: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:55 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:55 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0) [ 177.841551][ T9738] loop2: p4 start 1854537728 is beyond EOD, truncated 15:44:55 executing program 5: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:55 executing program 1: 15:44:55 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000"], 0x0) 15:44:55 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:55 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(0x0, &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}]) 15:44:55 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:55 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:55 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:55 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 15:44:55 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:55 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 15:44:55 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 15:44:56 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) [ 178.979313][ T9801] loop4: p1 < > p4 15:44:56 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:56 executing program 1: [ 179.050240][ T9801] loop4: p4 start 1854537728 is beyond EOD, truncated 15:44:56 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0x0, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) 15:44:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:56 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) 15:44:56 executing program 1: 15:44:56 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:56 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000000100000000100000000000000080022eb00000000080000000200000000000000000000000800655800000000"], 0x0) 15:44:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) 15:44:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) [ 179.531926][ T9867] ip6_tunnel: non-ECT from fe80:0000:8000:0000:0000:0000:0000:00aa with DS=0xa [ 179.566273][ T9867] ip6_tunnel: non-ECT from fe80:0000:8000:0000:0000:0000:0000:00aa with DS=0xa [ 179.650767][ T26] audit: type=1800 audit(1562514296.907:32): pid=9863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16609 res=0 15:44:56 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900442f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:44:57 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:57 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) 15:44:57 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:57 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff86dd60a1bba900082f00fe8000008000000000000000000000aafe8000000000000000000000000000aa062088be00000001100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) 15:44:57 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:57 executing program 1: 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:57 executing program 2: [ 180.331990][ T26] audit: type=1800 audit(1562514297.597:33): pid=9911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16602 res=0 15:44:57 executing program 3: 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:57 executing program 1: 15:44:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:58 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:58 executing program 1: 15:44:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 15:44:58 executing program 2: [ 180.761918][ T9925] loop4: p1 < > p4 [ 180.888580][ T9925] loop4: p4 start 1854537728 is beyond EOD, truncated [ 181.103833][ T26] audit: type=1800 audit(1562514298.367:34): pid=9956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16620 res=0 15:44:58 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:58 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, 0x0) 15:44:58 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x0, &(0x7f0000000480)) 15:44:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x0, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:58 executing program 3: stat(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:58 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) [ 181.626034][ T9980] loop3: p1 < > p4 [ 181.642281][ T9980] loop3: partition table partially beyond EOD, truncated [ 181.661768][ T9980] loop3: p1 size 2 extends beyond EOD, truncated [ 181.705587][ T9980] loop3: p4 start 1854537728 is beyond EOD, truncated 15:44:59 executing program 1: 15:44:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:44:59 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:59 executing program 1: 15:44:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000006703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:44:59 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:44:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 15:44:59 executing program 1: syz_emit_ethernet(0xff1f, &(0x7f0000000200)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xff000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 182.158518][T10015] loop3: p1 < > p4 [ 182.166576][T10015] loop3: partition table partially beyond EOD, truncated [ 182.204268][T10015] loop3: p1 size 2 extends beyond EOD, truncated [ 182.218716][T10015] loop3: p4 start 1854537728 is beyond EOD, truncated 15:44:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 15:44:59 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x44, 0x11, 0x0, @empty, @empty={[0x0, 0x0, 0x0, 0xc00c0000]}, {[], @gre}}}}}, 0x0) 15:44:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 15:44:59 executing program 3: stat(&(0x7f0000000000)='./file0\x00', 0x0) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:59 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_read_part_table(0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 15:44:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, 0x0, 0x0) 15:44:59 executing program 2: 15:44:59 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 182.628661][T10051] loop3: p1 < > p4 [ 182.652357][T10051] loop3: partition table partially beyond EOD, truncated [ 182.704169][T10051] loop3: p1 size 2 extends beyond EOD, truncated 15:45:00 executing program 2: 15:45:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:45:00 executing program 1: [ 182.794125][T10051] loop3: p4 start 1854537728 is beyond EOD, truncated [ 182.959253][T10057] loop4: p1 < > p4 15:45:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:45:00 executing program 2: 15:45:00 executing program 1: 15:45:00 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) [ 183.063159][T10057] loop4: p4 start 1854537728 is beyond EOD, truncated 15:45:00 executing program 3: 15:45:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000000500000065000000000000009500000000000000"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 15:45:00 executing program 2: 15:45:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:45:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000002403000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:45:00 executing program 1: syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00') 15:45:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:45:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004003000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:45:00 executing program 1: syz_emit_ethernet(0x155, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6081182e00442f00fe80000000000000000000000015b52d1eacbbb5c0451cf60000aafe8000000000000000000000000000aa042065580000000000000800000086dd88ca88be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 15:45:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:45:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, 0x0) clock_gettime(0x2, &(0x7f0000000140)) 15:45:01 executing program 0: mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x9, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000640)={0x0, 0x84ff}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x1003fffffffffffc, 0xfffffffffffffffd) chroot(0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x23, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x4, 0x13, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getpgrp(0xffffffffffffffff) gettid() syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) chdir(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1000, 0x5a67, 0xfffffffffffffffd, 0x7, 0x0, 0xfffffffffffff74f}) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0xb9) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 15:45:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 15:45:01 executing program 4: 15:45:01 executing program 1: 15:45:01 executing program 2: 15:45:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004603000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:45:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0xbdab) 15:45:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000004503000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:45:01 executing program 2: 15:45:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0xc, 0x209e1e, 0x408000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x820000, 0x0, 0x2}, 0x2c) [ 184.422166][T10150] ------------[ cut here ]------------ [ 184.463263][T10150] verifier backtracking bug [ 184.463422][T10150] WARNING: CPU: 1 PID: 10150 at kernel/bpf/verifier.c:1755 mark_chain_precision+0x15c2/0x18e0 [ 184.479680][T10150] Kernel panic - not syncing: panic_on_warn set ... [ 184.486285][T10150] CPU: 1 PID: 10150 Comm: syz-executor.3 Not tainted 5.2.0-rc7-next-20190703 #28 [ 184.495398][T10150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.505468][T10150] Call Trace: [ 184.508776][T10150] dump_stack+0x172/0x1f0 [ 184.513123][T10150] ? mark_chain_precision+0x1520/0x18e0 [ 184.518691][T10150] panic+0x2dc/0x755 [ 184.522643][T10150] ? add_taint.cold+0x16/0x16 [ 184.527340][T10150] ? kasan_check_write+0x14/0x20 [ 184.532317][T10150] ? __warn.cold+0x5/0x4c [ 184.536682][T10150] ? mark_chain_precision+0x15c2/0x18e0 [ 184.542238][T10150] __warn.cold+0x20/0x4c [ 184.546492][T10150] ? mark_chain_precision+0x15c2/0x18e0 [ 184.552050][T10150] report_bug+0x263/0x2b0 [ 184.556388][T10150] do_error_trap+0x11b/0x200 [ 184.560990][T10150] do_invalid_op+0x37/0x50 [ 184.565412][T10150] ? mark_chain_precision+0x15c2/0x18e0 [ 184.570964][T10150] invalid_op+0x14/0x20 [ 184.575125][T10150] RIP: 0010:mark_chain_precision+0x15c2/0x18e0 [ 184.581277][T10150] Code: e9 55 f2 ff ff 48 89 df e8 5b c9 2c 00 e9 3a f3 ff ff e8 21 a7 f2 ff 48 c7 c7 60 9d 91 87 c6 05 1e f8 1f 08 01 e8 96 1f c4 ff <0f> 0b 41 be f2 ff ff ff e9 eb f7 ff ff e8 fc a6 f2 ff 45 31 f6 e9 [ 184.600889][T10150] RSP: 0018:ffff88805ed57378 EFLAGS: 00010282 [ 184.606961][T10150] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 184.614955][T10150] RDX: 000000000000b939 RSI: ffffffff815c0c96 RDI: ffffed100bdaae61 [ 184.622944][T10150] RBP: ffff88805ed574d0 R08: ffff888096a4e580 R09: 0000000000000000 [ 184.630921][T10150] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 184.638901][T10150] R13: ffff888063546a00 R14: 0000000000000001 R15: dffffc0000000000 [ 184.646921][T10150] ? vprintk_func+0x86/0x189 [ 184.651534][T10150] ? mark_chain_precision+0x15c2/0x18e0 [ 184.657127][T10150] ? mark_reg_unknown+0x50/0x50 [ 184.661989][T10150] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 184.667809][T10150] ? bpf_verifier_log_write+0x240/0x240 [ 184.673380][T10150] ? check_reg_arg+0x1f1/0x480 [ 184.678458][T10150] check_cond_jmp_op+0xcce/0x3c20 [ 184.683496][T10150] ? security_capable+0x95/0xc0 [ 184.688368][T10150] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 184.694015][T10150] ? find_held_lock+0x35/0x130 [ 184.698795][T10150] ? __sanitizer_cov_trace_const_cmp2+0x1d/0x20 [ 184.705055][T10150] ? check_func_arg+0x11b0/0x11b0 [ 184.710097][T10150] ? fault_create_debugfs_attr+0x180/0x180 [ 184.715911][T10150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.722153][T10150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.728402][T10150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.734646][T10150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.740897][T10150] ? krealloc+0x7b/0xd0 [ 184.745053][T10150] ? krealloc+0x7b/0xd0 [ 184.749221][T10150] ? rcu_read_lock_sched_held+0x110/0x130 [ 184.755028][T10150] ? kfree+0x28b/0x2c0 [ 184.759098][T10150] do_check+0x6187/0x8990 [ 184.763428][T10150] ? find_held_lock+0x35/0x130 [ 184.768215][T10150] ? check_helper_call+0x3210/0x3210 [ 184.773499][T10150] ? kfree+0x226/0x2c0 [ 184.777566][T10150] ? kvfree+0x61/0x70 [ 184.781561][T10150] ? kfree+0x226/0x2c0 [ 184.785638][T10150] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.790935][T10150] ? trace_hardirqs_on+0x67/0x240 [ 184.795960][T10150] ? kvfree+0x61/0x70 [ 184.799950][T10150] bpf_check+0x6f99/0x9948 [ 184.804378][T10150] ? do_check+0x8990/0x8990 [ 184.808883][T10150] ? lock_downgrade+0x920/0x920 [ 184.813733][T10150] ? ktime_get_with_offset+0x13a/0x350 [ 184.819189][T10150] ? bpf_prog_load+0xdce/0x1670 [ 184.824031][T10150] ? ktime_get_with_offset+0x13a/0x350 [ 184.829492][T10150] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.834783][T10150] ? trace_hardirqs_on+0x67/0x240 [ 184.839838][T10150] ? memset+0x32/0x40 [ 184.843826][T10150] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 184.850065][T10150] ? bpf_obj_name_cpy+0x13f/0x190 [ 184.855093][T10150] bpf_prog_load+0xe68/0x1670 [ 184.859776][T10150] ? bpf_prog_new_fd+0x60/0x60 [ 184.864543][T10150] ? lock_downgrade+0x920/0x920 [ 184.869435][T10150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.875677][T10150] ? security_bpf+0x8b/0xc0 [ 184.880188][T10150] __do_sys_bpf+0xa46/0x42f0 [ 184.884784][T10150] ? bpf_prog_load+0x1670/0x1670 [ 184.889734][T10150] ? kasan_check_read+0x11/0x20 [ 184.894589][T10150] ? _copy_to_user+0x118/0x160 [ 184.899355][T10150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.905593][T10150] ? put_timespec64+0xda/0x140 [ 184.910350][T10150] ? nsecs_to_jiffies+0x30/0x30 [ 184.915209][T10150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.920669][T10150] ? do_syscall_64+0x26/0x6a0 [ 184.925339][T10150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.931405][T10150] ? do_syscall_64+0x26/0x6a0 [ 184.936092][T10150] __x64_sys_bpf+0x73/0xb0 [ 184.940516][T10150] do_syscall_64+0xfd/0x6a0 [ 184.945023][T10150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.950911][T10150] RIP: 0033:0x4597c9 [ 184.954804][T10150] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.974411][T10150] RSP: 002b:00007f1988ea9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.982831][T10150] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 184.990986][T10150] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 184.998960][T10150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.006930][T10150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1988eaa6d4 [ 185.014902][T10150] R13: 00000000004bfc12 R14: 00000000004d15f8 R15: 00000000ffffffff [ 185.024019][T10150] Kernel Offset: disabled [ 185.028407][T10150] Rebooting in 86400 seconds..