Warning: Permanently added '10.128.0.73' (ECDSA) to the list of known hosts. 2020/01/08 04:33:27 fuzzer started 2020/01/08 04:33:29 dialing manager at 10.128.0.105:46717 2020/01/08 04:33:30 syscalls: 2808 2020/01/08 04:33:30 code coverage: enabled 2020/01/08 04:33:30 comparison tracing: enabled 2020/01/08 04:33:30 extra coverage: enabled 2020/01/08 04:33:30 setuid sandbox: enabled 2020/01/08 04:33:30 namespace sandbox: enabled 2020/01/08 04:33:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/08 04:33:30 fault injection: enabled 2020/01/08 04:33:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/08 04:33:30 net packet injection: enabled 2020/01/08 04:33:30 net device setup: enabled 2020/01/08 04:33:30 concurrency sanitizer: enabled 2020/01/08 04:33:30 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 70.151282][ T7901] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/08 04:33:40 adding functions to KCSAN blacklist: 'generic_write_end' 'ext4_has_free_clusters' 'add_timer' 'blk_mq_run_hw_queue' 'unix_release_sock' 'n_tty_receive_buf_common' 'xas_find_marked' 'tick_nohz_next_event' 'xas_clear_mark' 'do_exit' 'ext4_free_inode' 'tick_nohz_idle_stop_tick' 'wbt_done' 'tick_do_update_jiffies64' 'ext4_mark_iloc_dirty' '__hrtimer_run_queues' 'mod_timer' 'generic_fillattr' '__perf_event_overflow' 'evict' 'ktime_get_ts64' 'virtqueue_disable_cb' 'tomoyo_supervisor' 'iput' 'd_instantiate_new' 'copy_process' 'shmem_add_to_page_cache' 'ext4_free_inodes_count' '__do_page_cache_readahead' 'process_srcu' '__ext4_new_inode' 'sbitmap_queue_clear' 'generic_permission' 'ext4_sync_file' 'generic_file_read_iter' '__snd_rawmidi_transmit_ack' 'fasync_remove_entry' 'audit_log_start' 'ep_poll' 'do_nanosleep' 'tick_sched_do_timer' 'poll_schedule_timeout' 'pcpu_alloc' 'ext4_mb_good_group' 'echo_char' 'find_get_pages_range_tag' 'run_timer_softirq' 'kauditd_thread' 'ktime_get_real_seconds' 'pid_update_inode' 'can_send' 'do_syslog' 'inode_sync_complete' '__add_to_page_cache_locked' 'vm_area_dup' 'mm_update_next_owner' 'blk_mq_get_request' 'blk_mq_sched_dispatch_requests' 'futex_wait_queue_me' 'rcu_gp_fqs_loop' '__mark_inode_dirty' 'find_next_bit' 'iomap_dio_bio_actor' 'ext4_nonda_switch' 'sit_tunnel_xmit' 'timer_clear_idle' 'wbt_issue' 'dd_has_work' 'blk_mq_dispatch_rq_list' 'taskstats_exit' 'rcu_gp_fqs_check_wake' 'schedule_hrtimeout_range_clock' 04:36:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x13}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) [ 240.252322][ T7903] IPVS: ftp: loaded support on port[0] = 21 04:36:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) [ 240.332981][ T7903] chnl_net:caif_netlink_parms(): no params data found [ 240.400274][ T7903] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.425528][ T7903] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.433285][ T7903] device bridge_slave_0 entered promiscuous mode [ 240.446567][ T7903] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.456354][ T7903] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.475575][ T7903] device bridge_slave_1 entered promiscuous mode [ 240.491474][ T7907] IPVS: ftp: loaded support on port[0] = 21 [ 240.508086][ T7903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.536575][ T7903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:36:27 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc2019, 0x0) [ 240.575080][ T7903] team0: Port device team_slave_0 added [ 240.584209][ T7903] team0: Port device team_slave_1 added [ 240.668141][ T7903] device hsr_slave_0 entered promiscuous mode [ 240.725715][ T7903] device hsr_slave_1 entered promiscuous mode 04:36:27 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 240.810318][ T7907] chnl_net:caif_netlink_parms(): no params data found [ 240.833840][ T7910] IPVS: ftp: loaded support on port[0] = 21 [ 240.922969][ T7907] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.930577][ T7907] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.939332][ T7907] device bridge_slave_0 entered promiscuous mode [ 240.965663][ T7903] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 241.008642][ T7907] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.026430][ T7907] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.034181][ T7907] device bridge_slave_1 entered promiscuous mode [ 241.044477][ T7903] netdevsim netdevsim0 netdevsim1: renamed from eth1 04:36:27 executing program 4: r0 = socket(0x1e, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") bind(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1, 0x2}}, 0x10) bind(r0, 0x0, 0x0) [ 241.093597][ T7903] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 241.148605][ T7903] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 241.196787][ T7907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.209576][ T7913] IPVS: ftp: loaded support on port[0] = 21 [ 241.238620][ T7903] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.245766][ T7903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.253049][ T7903] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.260145][ T7903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.273351][ T7907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.356681][ T7907] team0: Port device team_slave_0 added [ 241.363036][ T7906] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.381953][ T7906] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.398517][ T7907] team0: Port device team_slave_1 added 04:36:27 executing program 5: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x1b6}, 0xc9015284) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7}, 0x7) [ 241.407597][ T7910] chnl_net:caif_netlink_parms(): no params data found [ 241.421870][ T7916] IPVS: ftp: loaded support on port[0] = 21 [ 241.527573][ T7907] device hsr_slave_0 entered promiscuous mode [ 241.596208][ T7907] device hsr_slave_1 entered promiscuous mode [ 241.635539][ T7907] debugfs: Directory 'hsr0' with parent '/' already present! [ 241.685507][ T7910] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.692693][ T7910] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.701240][ T7910] device bridge_slave_0 entered promiscuous mode [ 241.710565][ T7910] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.717995][ T7910] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.729396][ T7910] device bridge_slave_1 entered promiscuous mode [ 241.749317][ T7913] chnl_net:caif_netlink_parms(): no params data found [ 241.765666][ T7903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.782257][ T7920] IPVS: ftp: loaded support on port[0] = 21 [ 241.801976][ T7910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.837802][ T7910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.861117][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.870584][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.880353][ T7903] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.933858][ T7910] team0: Port device team_slave_0 added [ 241.952640][ T7910] team0: Port device team_slave_1 added [ 241.959463][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.969271][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.978300][ T7918] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.986302][ T7918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.998654][ T7913] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.007710][ T7913] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.015420][ T7913] device bridge_slave_0 entered promiscuous mode [ 242.022991][ T7913] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.030558][ T7913] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.040249][ T7913] device bridge_slave_1 entered promiscuous mode [ 242.047510][ T7907] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 242.108306][ T7907] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 242.177774][ T7907] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 242.228999][ T7907] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 242.287737][ T7916] chnl_net:caif_netlink_parms(): no params data found [ 242.308030][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.317718][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.327330][ T7922] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.334449][ T7922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.348666][ T7913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.417318][ T7910] device hsr_slave_0 entered promiscuous mode [ 242.465829][ T7910] device hsr_slave_1 entered promiscuous mode [ 242.525597][ T7910] debugfs: Directory 'hsr0' with parent '/' already present! [ 242.533684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.542554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.556991][ T7913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.616768][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.625696][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.640921][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.658206][ T7913] team0: Port device team_slave_0 added [ 242.663977][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.671105][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.679087][ T7916] device bridge_slave_0 entered promiscuous mode [ 242.701182][ T7920] chnl_net:caif_netlink_parms(): no params data found [ 242.711486][ T7913] team0: Port device team_slave_1 added [ 242.717840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.728359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.736978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.745058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.753412][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.761790][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.770498][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.777940][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.785923][ T7916] device bridge_slave_1 entered promiscuous mode [ 242.805314][ T7916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.844240][ T7916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.854318][ T7903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.928246][ T7913] device hsr_slave_0 entered promiscuous mode [ 242.956071][ T7913] device hsr_slave_1 entered promiscuous mode [ 242.995566][ T7913] debugfs: Directory 'hsr0' with parent '/' already present! [ 243.014969][ T7910] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 243.066899][ T7916] team0: Port device team_slave_0 added [ 243.074605][ T7916] team0: Port device team_slave_1 added [ 243.083280][ T7910] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 243.148558][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.156204][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.164051][ T7920] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.171471][ T7920] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.179168][ T7920] device bridge_slave_0 entered promiscuous mode [ 243.186735][ T7920] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.193811][ T7920] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.201631][ T7920] device bridge_slave_1 entered promiscuous mode [ 243.219473][ T7910] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 243.277301][ T7903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.328038][ T7916] device hsr_slave_0 entered promiscuous mode [ 243.365838][ T7916] device hsr_slave_1 entered promiscuous mode [ 243.405678][ T7916] debugfs: Directory 'hsr0' with parent '/' already present! [ 243.413241][ T7910] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 243.471558][ T7907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.489889][ T7920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.515063][ T7920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.540896][ T7913] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 243.597668][ T7913] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 243.633954][ T7913] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 243.669656][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.678657][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.708290][ T7913] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 243.758160][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.766025][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.773907][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.782388][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.791626][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.799812][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.813039][ T7903] device veth0_vlan entered promiscuous mode [ 243.822023][ T7920] team0: Port device team_slave_0 added [ 243.830259][ T7907] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.843751][ T7920] team0: Port device team_slave_1 added [ 243.861327][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.869998][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.878851][ T7922] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.886108][ T7922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.894190][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.903026][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.911735][ T7922] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.919332][ T7922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.928477][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.987889][ T7920] device hsr_slave_0 entered promiscuous mode [ 244.045916][ T7920] device hsr_slave_1 entered promiscuous mode [ 244.105597][ T7920] debugfs: Directory 'hsr0' with parent '/' already present! [ 244.118811][ T7903] device veth1_vlan entered promiscuous mode [ 244.140182][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.148457][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 244.158975][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.183010][ T7916] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 244.239366][ T7916] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 244.282340][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.306554][ T7916] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 244.337428][ T7916] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 244.387688][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.397155][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.406469][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.415219][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.424468][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.451684][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 244.462612][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.471039][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.479605][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.502808][ T7910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.515669][ T7907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 244.555415][ T7913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.574092][ T7920] netdevsim netdevsim5 netdevsim0: renamed from eth0 04:36:31 executing program 0: [ 244.607331][ T7920] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 244.642464][ T7910] 8021q: adding VLAN 0 to HW filter on device team0 04:36:31 executing program 0: [ 244.664928][ T7920] netdevsim netdevsim5 netdevsim2: renamed from eth2 04:36:31 executing program 0: [ 244.707810][ T7920] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 244.747906][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.760102][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.779332][ T7913] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.801487][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.811144][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.828771][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.845886][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.854619][ T7906] bridge0: port 1(bridge_slave_0) entered blocking state 04:36:31 executing program 0: [ 244.861679][ T7906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.878074][ T7907] 8021q: adding VLAN 0 to HW filter on device batadv0 04:36:31 executing program 0: [ 244.925989][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.946159][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.954337][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.963016][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:36:31 executing program 0: [ 244.972121][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.992775][ T7906] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.000142][ T7906] bridge0: port 2(bridge_slave_1) entered forwarding state 04:36:31 executing program 0: [ 245.028279][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.045905][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.054486][ T7906] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.061764][ T7906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.084518][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.105227][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.117133][ T7906] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.124275][ T7906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.145301][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.158050][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.168157][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.176702][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.185378][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.194424][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.204194][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.212292][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.226341][ T7916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.251937][ T7913] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 245.263474][ T7913] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.286579][ T7916] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.294106][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.302474][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.311008][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.319663][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.328522][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.336308][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.344464][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.356001][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.370335][ T7920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.389596][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.398534][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.407328][ T7906] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.414351][ T7906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.422357][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.431210][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.439815][ T7906] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.447024][ T7906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.455027][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 245.462596][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 245.470013][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.479080][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.488014][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.496735][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 245.505245][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.514006][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.532295][ T7916] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 245.543133][ T7916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.566040][ T7920] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.575217][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.584299][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.593165][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.602943][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.611647][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.620570][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.629135][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.637626][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.646346][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.653947][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.662028][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.670299][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.680018][ T7913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.700679][ T7916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.717642][ T7907] device veth0_vlan entered promiscuous mode [ 245.736793][ T7910] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 245.748835][ T7910] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.760347][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.769309][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.778242][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.786706][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.795402][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.804018][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.812459][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 245.820192][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 245.827753][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.836230][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.844517][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.853138][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.861580][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.870396][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.878748][ T2414] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.885870][ T2414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.893615][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.902671][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.911317][ T2414] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.918410][ T2414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.926682][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.937498][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.946535][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.955008][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.963732][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.972111][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.980299][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.988327][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.996331][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.004373][ T2414] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.016929][ T7907] device veth1_vlan entered promiscuous mode [ 246.029542][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.038482][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.047327][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.056048][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.076222][ T7910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.094746][ T7913] device veth0_vlan entered promiscuous mode [ 246.104807][ T7920] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 246.116140][ T7920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.127619][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.135095][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.143028][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.151894][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.161347][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.169491][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.178201][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.187885][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.219751][ T7913] device veth1_vlan entered promiscuous mode [ 246.258250][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 04:36:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) [ 246.273216][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.287637][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.300951][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.310086][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.322978][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.332319][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.344192][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.369562][ T7910] device veth0_vlan entered promiscuous mode [ 246.412313][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.433385][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.451833][ T7910] device veth1_vlan entered promiscuous mode [ 246.499760][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.510495][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.518727][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.528270][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.540911][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.548702][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.557673][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.567017][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.574955][ T7912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.582746][ T7961] loop3: p1 p2[EZD] p3 p4 [ 246.589737][ T7961] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 246.600581][ T7920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.608595][ T7916] device veth0_vlan entered promiscuous mode [ 246.619928][ T7961] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 246.631442][ T7961] loop3: p4 size 32768 extends beyond EOD, truncated [ 246.654007][ T7916] device veth1_vlan entered promiscuous mode [ 246.791793][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.813385][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.864327][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 247.003966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.018874][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 04:36:33 executing program 2: 04:36:33 executing program 0: 04:36:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) [ 247.060729][ T7920] device veth0_vlan entered promiscuous mode [ 247.113738][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.123492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.153338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.180877][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.211936][ T7920] device veth1_vlan entered promiscuous mode 04:36:33 executing program 5: 04:36:33 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:33 executing program 4: 04:36:33 executing program 0: 04:36:33 executing program 2: 04:36:33 executing program 1: 04:36:33 executing program 0: 04:36:33 executing program 4: 04:36:34 executing program 2: 04:36:34 executing program 1: 04:36:34 executing program 5: [ 247.616541][ T8012] loop3: p1 p2[EZD] p3 p4 [ 247.635720][ T8012] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:34 executing program 4: 04:36:34 executing program 1: [ 247.736725][ T8012] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 247.771781][ T8012] loop3: p4 size 32768 extends beyond EOD, truncated [ 247.798658][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 247.819970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 04:36:34 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:34 executing program 0: 04:36:34 executing program 2: 04:36:34 executing program 5: 04:36:34 executing program 1: 04:36:34 executing program 4: 04:36:34 executing program 1: 04:36:34 executing program 5: 04:36:34 executing program 0: 04:36:34 executing program 2: [ 248.296178][ T8045] loop3: p1 p2[EZD] p3 p4 [ 248.311281][ T8045] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 248.335724][ T8045] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:34 executing program 1: 04:36:34 executing program 4: [ 248.355602][ T8045] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:35 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:35 executing program 0: 04:36:35 executing program 2: 04:36:35 executing program 5: 04:36:35 executing program 1: 04:36:35 executing program 4: 04:36:35 executing program 1: 04:36:35 executing program 2: 04:36:35 executing program 0: 04:36:35 executing program 4: 04:36:35 executing program 5: [ 248.919327][ T8072] loop3: p1 p2[EZD] p3 p4 04:36:35 executing program 0: [ 248.949416][ T8072] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 249.031125][ T8072] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 249.096061][ T8072] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:35 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:35 executing program 1: 04:36:35 executing program 2: 04:36:35 executing program 5: 04:36:35 executing program 4: 04:36:35 executing program 0: 04:36:35 executing program 2: 04:36:35 executing program 4: 04:36:35 executing program 1: 04:36:36 executing program 5: 04:36:36 executing program 0: 04:36:36 executing program 1: [ 249.685642][ T8106] loop3: p1 p2[EZD] p3 p4 [ 249.694054][ T8106] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 249.742954][ T8106] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 249.750723][ T8106] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:36 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:36 executing program 2: 04:36:36 executing program 4: 04:36:36 executing program 0: 04:36:36 executing program 1: 04:36:36 executing program 5: 04:36:36 executing program 2: 04:36:36 executing program 1: 04:36:36 executing program 4: 04:36:36 executing program 0: 04:36:36 executing program 5: 04:36:36 executing program 2: [ 250.327940][ T8136] loop3: p1 p2[EZD] p3 p4 [ 250.359469][ T8136] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 250.391958][ T8136] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 250.483135][ T8136] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:37 executing program 4: 04:36:37 executing program 1: 04:36:37 executing program 2: 04:36:37 executing program 5: 04:36:37 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:37 executing program 0: 04:36:37 executing program 1: 04:36:37 executing program 5: 04:36:37 executing program 0: 04:36:37 executing program 4: 04:36:37 executing program 2: [ 250.899609][ T8161] loop3: p1 p2[EZD] p3 p4 04:36:37 executing program 0: 04:36:37 executing program 5: 04:36:37 executing program 4: [ 250.964744][ T8161] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 251.033694][ T8161] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:37 executing program 2: 04:36:37 executing program 4: [ 251.079216][ T8161] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:37 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:37 executing program 0: 04:36:37 executing program 1: 04:36:37 executing program 5: 04:36:37 executing program 2: 04:36:37 executing program 4: 04:36:38 executing program 0: 04:36:38 executing program 1: 04:36:38 executing program 5: 04:36:38 executing program 2: 04:36:38 executing program 2: [ 251.705509][ T8198] loop3: p1 p2[EZD] p3 p4 [ 251.710701][ T8198] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 251.726197][ T8198] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 251.742672][ T8198] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:38 executing program 4: 04:36:38 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:38 executing program 0: 04:36:38 executing program 5: 04:36:38 executing program 1: 04:36:38 executing program 2: 04:36:38 executing program 4: 04:36:38 executing program 1: 04:36:38 executing program 5: 04:36:38 executing program 0: [ 252.215787][ T8225] loop3: p1 p2[EZD] p3 p4 [ 252.249298][ T8225] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 252.271581][ T8225] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:38 executing program 4: [ 252.316252][ T8225] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:38 executing program 2: 04:36:38 executing program 1: 04:36:38 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:38 executing program 5: 04:36:38 executing program 0: 04:36:39 executing program 4: 04:36:39 executing program 2: 04:36:39 executing program 0: 04:36:39 executing program 1: 04:36:39 executing program 5: [ 252.778108][ T8250] loop3: p1 p2[EZD] p3 p4 [ 252.806212][ T8250] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 252.830173][ T8250] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:39 executing program 2: 04:36:39 executing program 1: [ 252.871466][ T8250] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:39 executing program 0: 04:36:39 executing program 4: 04:36:39 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:39 executing program 2: 04:36:39 executing program 1: 04:36:39 executing program 5: 04:36:39 executing program 4: 04:36:39 executing program 2: 04:36:39 executing program 1: 04:36:39 executing program 5: [ 253.388711][ T8278] loop3: p1 p2[EZD] p3 p4 [ 253.406011][ T8278] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 253.427091][ T8278] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 253.434966][ T8278] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:40 executing program 0: 04:36:40 executing program 5: 04:36:40 executing program 1: 04:36:40 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:40 executing program 4: 04:36:40 executing program 2: 04:36:40 executing program 5: 04:36:40 executing program 0: 04:36:40 executing program 1: 04:36:40 executing program 4: 04:36:40 executing program 2: [ 253.975525][ T8299] loop3: p1 p2[EZD] p3 p4 [ 253.987771][ T8299] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:40 executing program 0: 04:36:40 executing program 5: 04:36:40 executing program 1: [ 254.158669][ T8299] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:40 executing program 4: [ 254.251803][ T8299] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:41 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:41 executing program 0: 04:36:41 executing program 2: 04:36:41 executing program 5: 04:36:41 executing program 1: 04:36:41 executing program 4: 04:36:41 executing program 5: 04:36:41 executing program 0: 04:36:41 executing program 2: 04:36:41 executing program 1: 04:36:41 executing program 4: [ 254.811791][ T8341] loop3: p1 p2[EZD] p3 p4 [ 254.825841][ T8341] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:41 executing program 5: [ 254.861415][ T8341] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 254.936109][ T8341] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:41 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:41 executing program 4: 04:36:41 executing program 1: 04:36:41 executing program 2: 04:36:41 executing program 0: 04:36:41 executing program 5: 04:36:41 executing program 1: 04:36:41 executing program 2: 04:36:41 executing program 0: 04:36:41 executing program 4: 04:36:41 executing program 5: [ 255.410587][ T8367] loop3: p1 p2[EZD] p3 p4 04:36:41 executing program 2: [ 255.460564][ T8367] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 255.531182][ T8367] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 255.580959][ T8367] loop3: p4 size 32768 extends beyond EOD, truncated [ 255.743259][ T8382] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 255.751034][ T8383] blk_update_request: I/O error, dev loop3, sector 17792 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 255.781707][ T8367] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 255.784320][ T8385] blk_update_request: I/O error, dev loop3, sector 17792 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 255.794651][ T8386] blk_update_request: I/O error, dev loop3, sector 17792 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 255.824468][ T2503] blk_update_request: I/O error, dev loop3, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.835466][ T2503] Buffer I/O error on dev loop3p1, logical block 0, async page read 04:36:42 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:42 executing program 5: 04:36:42 executing program 1: 04:36:42 executing program 4: 04:36:42 executing program 2: 04:36:42 executing program 0: [ 255.843540][ T2503] blk_update_request: I/O error, dev loop3, sector 17792 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.854870][ T2503] Buffer I/O error on dev loop3p2, logical block 17792, async page read [ 255.863262][ T2503] blk_update_request: I/O error, dev loop3, sector 17793 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.874937][ T2503] Buffer I/O error on dev loop3p2, logical block 17793, async page read [ 255.883374][ T2503] blk_update_request: I/O error, dev loop3, sector 17793 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.895507][ T2503] Buffer I/O error on dev loop3p4, logical block 17793, async page read [ 255.903884][ T2503] blk_update_request: I/O error, dev loop3, sector 17794 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.925515][ T2503] Buffer I/O error on dev loop3p2, logical block 17794, async page read [ 255.934339][ T2503] blk_update_request: I/O error, dev loop3, sector 17794 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 255.945576][ T2503] Buffer I/O error on dev loop3p4, logical block 17794, async page read [ 255.953953][ T2503] Buffer I/O error on dev loop3p2, logical block 17795, async page read [ 255.962636][ T2503] Buffer I/O error on dev loop3p4, logical block 17795, async page read [ 255.971024][ T2503] Buffer I/O error on dev loop3p2, logical block 17796, async page read [ 255.979489][ T2503] Buffer I/O error on dev loop3p4, logical block 17796, async page read 04:36:42 executing program 2: 04:36:42 executing program 1: 04:36:42 executing program 4: 04:36:42 executing program 0: 04:36:42 executing program 5: 04:36:42 executing program 2: [ 256.286288][ T8397] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 04:36:43 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:43 executing program 4: 04:36:43 executing program 1: 04:36:43 executing program 0: 04:36:43 executing program 5: 04:36:43 executing program 2: 04:36:43 executing program 1: 04:36:43 executing program 4: 04:36:43 executing program 2: 04:36:43 executing program 0: 04:36:43 executing program 5: [ 256.895762][ T8422] loop3: p1 p2[EZD] p3 p4 04:36:43 executing program 2: [ 256.928668][ T8422] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 256.974549][ T8422] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 257.041414][ T8422] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:43 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:43 executing program 4: 04:36:43 executing program 0: 04:36:43 executing program 1: 04:36:43 executing program 5: 04:36:43 executing program 2: 04:36:43 executing program 0: 04:36:43 executing program 4: 04:36:43 executing program 1: 04:36:43 executing program 5: 04:36:43 executing program 2: 04:36:44 executing program 0: [ 257.521027][ T8449] loop3: p1 p2[EZD] p3 p4 [ 257.561757][ T8449] loop3: partition table partially beyond EOD, truncated [ 257.654072][ T8449] loop3: p1 start 1 is beyond EOD, truncated [ 257.715404][ T8449] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 257.780989][ T8449] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 257.833749][ T8449] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:44 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:44 executing program 2: 04:36:44 executing program 5: 04:36:44 executing program 4: 04:36:44 executing program 0: 04:36:44 executing program 1: 04:36:44 executing program 0: 04:36:44 executing program 1: 04:36:44 executing program 4: 04:36:44 executing program 2: 04:36:44 executing program 5: 04:36:44 executing program 4: [ 258.313336][ T8479] loop3: p1 p2[EZD] p3 p4 [ 258.330958][ T8479] loop3: partition table partially beyond EOD, truncated [ 258.402455][ T8479] loop3: p1 start 1 is beyond EOD, truncated [ 258.415543][ T8479] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 258.427210][ T8479] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 258.443054][ T8479] loop3: p4 size 32768 extends beyond EOD, truncated [ 258.602251][ T8479] __loop_clr_fd: partition scan of loop3 failed (rc=-16) 04:36:45 executing program 0: 04:36:45 executing program 5: 04:36:45 executing program 1: 04:36:45 executing program 2: 04:36:45 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:45 executing program 4: 04:36:45 executing program 1: 04:36:45 executing program 2: 04:36:45 executing program 5: 04:36:45 executing program 4: 04:36:45 executing program 0: 04:36:45 executing program 1: [ 259.003393][ T8509] loop3: p1 p2[EZD] p3 p4 [ 259.029316][ T8509] loop3: partition table partially beyond EOD, truncated [ 259.065632][ T8509] loop3: p1 start 1 is beyond EOD, truncated 04:36:45 executing program 0: 04:36:45 executing program 4: [ 259.108976][ T8509] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:45 executing program 2: 04:36:45 executing program 5: [ 259.163988][ T8509] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 259.267109][ T8509] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:45 executing program 3: stat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:45 executing program 1: 04:36:45 executing program 0: 04:36:45 executing program 4: 04:36:45 executing program 2: 04:36:46 executing program 0: 04:36:46 executing program 5: 04:36:46 executing program 1: 04:36:46 executing program 4: 04:36:46 executing program 2: [ 259.845681][ T8547] loop3: p1 p2[EZD] p3 p4 04:36:46 executing program 5: [ 259.878893][ T8547] loop3: partition table partially beyond EOD, truncated 04:36:46 executing program 1: [ 259.939020][ T8547] loop3: p1 start 1 is beyond EOD, truncated [ 260.005264][ T8547] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 260.041034][ T8547] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 260.097729][ T8547] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:46 executing program 3: stat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:46 executing program 0: 04:36:46 executing program 5: 04:36:46 executing program 4: 04:36:46 executing program 2: 04:36:46 executing program 1: 04:36:46 executing program 1: 04:36:46 executing program 2: 04:36:46 executing program 4: 04:36:46 executing program 5: 04:36:46 executing program 0: 04:36:47 executing program 1: [ 260.585959][ T8579] loop3: p1 p2[EZD] p3 p4 [ 260.590443][ T8579] loop3: partition table partially beyond EOD, truncated [ 260.654229][ T8579] loop3: p1 start 1 is beyond EOD, truncated [ 260.686537][ T8579] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 260.709747][ T8579] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 260.725790][ T8579] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:47 executing program 3: stat(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:47 executing program 4: 04:36:47 executing program 2: 04:36:47 executing program 5: 04:36:47 executing program 1: 04:36:47 executing program 0: 04:36:47 executing program 5: 04:36:47 executing program 2: 04:36:47 executing program 4: 04:36:47 executing program 1: 04:36:47 executing program 0: [ 261.200300][ T8607] loop3: p1 p2[EZD] p3 p4 [ 261.232836][ T8607] loop3: partition table partially beyond EOD, truncated 04:36:47 executing program 0: [ 261.315277][ T8607] loop3: p1 start 1 is beyond EOD, truncated [ 261.339808][ T8607] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 261.419822][ T8607] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 261.478861][ T8607] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:48 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:48 executing program 4: 04:36:48 executing program 0: 04:36:48 executing program 5: 04:36:48 executing program 2: 04:36:48 executing program 1: 04:36:48 executing program 0: 04:36:48 executing program 2: 04:36:48 executing program 5: 04:36:48 executing program 1: 04:36:48 executing program 4: [ 261.948249][ T8638] loop3: p1 p2[EZD] p3 p4 [ 261.977993][ T8638] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:48 executing program 5: [ 262.020965][ T8638] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 262.067653][ T8638] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:48 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:48 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 04:36:48 executing program 4: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x10901, 0x38a) 04:36:48 executing program 1: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102009ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x810ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) mremap(&(0x7f00002dd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) sched_rr_get_interval(0x0, 0x0) 04:36:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) 04:36:48 executing program 5: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x18fd40, 0xa) 04:36:49 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xb102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="000000000000000000000000000200"}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000002c0), 0xfd65) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000080)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) [ 262.679235][ T8682] loop3: p1 p2[EZD] p3 p4 [ 262.709005][ T8682] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 262.748219][ T8682] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:49 executing program 2: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x4880, 0x1f7) [ 262.767259][ T8682] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:49 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x2102009ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x810ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00002dd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/54) 04:36:49 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:49 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) [ 263.296496][ T8717] loop3: p1 p2[EZD] p3 p4 [ 263.332639][ T8717] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 263.364864][ T8717] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:49 executing program 5: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff4a3) prctl$PR_GET_TIMERSLACK(0x1e) 04:36:49 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 263.430698][ T8717] loop3: p4 size 32768 extends beyond EOD, truncated [ 263.596146][ T8735] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.1 proc:/self/fd/5' not defined. 04:36:50 executing program 5: clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x12) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace(0x18, r0) r1 = getpid() r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x23, &(0x7f0000000000)={0x34}) getpeername$netlink(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 04:36:50 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000010c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) 04:36:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x0, 0x0, 0x0, 0x68) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x9) read(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_GSI_ROUTING(r4, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000000900000003210000000000000000000080000000ff030000010001002c0f00"/56]) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20000000fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x8000], 0x1f004, 0x110400}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x13c000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:36:50 executing program 2: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x4880, 0x1f7) [ 264.036400][ T8756] loop3: p1 p2[EZD] p3 p4 [ 264.071094][ T8756] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 264.119942][ T8764] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 264.165869][ T8756] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 264.177613][ T8756] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000010c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) 04:36:50 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) 04:36:51 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xee00]) setresgid(r0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 04:36:51 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:51 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 04:36:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) io_setup(0x1, &(0x7f0000000040)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f0000000080), 0x72a, 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0}]) [ 264.766392][ T8792] loop3: p1 p2[EZD] p3 p4 [ 264.774021][ T8792] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:51 executing program 2: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x4880, 0x1f7) [ 264.822437][ T8792] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 264.841350][ T8792] loop3: p4 size 32768 extends beyond EOD, truncated [ 264.844223][ C0] hrtimer: interrupt took 58902 ns 04:36:51 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xee00]) setresgid(r0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 04:36:51 executing program 1: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) io_setup(0x8, &(0x7f0000000040)=0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x72a, 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 04:36:51 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:51 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 04:36:51 executing program 4: socket(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x10, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) keyctl$update(0x2, 0x0, &(0x7f0000001040)="38ea549b36c2840c337b71f641906e1ae3dd61fbd2ee50c3cf921c8a047ee59d198fdd2fbd656b9fbfe2ecce64caa8b4d87fd6def8eacd9074d9f58474ed746b195c439f227a79b7fdb24feb9f4001a09ecc6acc447c919b59d4855104bff341cca4846009ea4100563c7dd4745d95878661f54edb41017b565500210b7b2f26c39324bc448d9c5284797ee516f0ac72f245b9a3ca53966ebbae5bf0e779a72264780dd72d427720ec696ae67c4e976b91d75f38bc4b6f790c2a63efc6d4a2d40bc81b13a1e88df2ffa7ba3a348a8bc6be211af41b56f306266847258a3d3b33efdf28ea0e8645f789bfd5cdaf0acfdbf69e14c9b19820bd7e01c2b6fa57f6ec34bb5054a8e44803c2e13671b87cd946b704f866cc63210c565a9371f544163efac5d74469fd47a3d6906ed19f20dca4f85b41df9d0a39319d2ef2d2d5289ebcfc51392300f09c890214261f21155f900ee50de6d439ed8c6279ae6d4687601c2c33a0aa63bfd2b1f98209b35e35fc9d63fc885772614fe86c86c701a4f24c2bf6062459de63d78d2296f767e8f815c00407827f99e5e1363b3c83f0760f10f690b1b765e18eba1f316aa4e6bc494b1450deb1dda771ee07a55dc3a38b3c8030dfbe2e6b5317da38e8d5393e204c24a5ff5f90cd9f82d59a654a7792b0f897593f23a0afba0913e066abecb1db02a44d428da49723b3e16bed8be1b2ed8c3bae7bdd096f2e91136654f81164cf26656b70135bbe5448fb3f234d355ae627e712543f50d00ec39faa210bacc10763d19551f3d490274f6d0b005210c7f24c15551e51127f2ae99005b1ee9999ed88c1fb478e4b629969a7a6ff7a0cb743e93f987b628043a959452008d370f0fdb5a243f98d2f7399b383a243150d0e3244d3162d412b46bcdd000eca59542bcc4ca725aacce51c44acf44c66171b6b545c642e1c48a6a5f9139ddfe88a28223077afaec3fb7dfbe2732a14f4b7bba8a5af8a17b9d43ebbc8e87145432332380120c30692d40c09ac5593308de9f645b94f72e839231cd55a3cd45914e32f8e825d6a8a9ff9c66b035078cf8ec29cd32b822508c54f64d2d99bd4ced558715e0084f8cc85da16c5ba9e0b1f91b7e7d73872fb70348b26fda6e23afae7dd876ae471eda6336e336c2702c9c512693136ff4296c1747adde3176c47f7cad620bfd1c2270cf3331bc3174ba60e0673a593f1e374f5b697e2f446e26d698736ebc5331c2ff79c74c84ca7ca659b7a9b45653414f49c09d1d19971e1565932b1e7ac2e0ee8cb716f21c951f60f9e3cbd2c29536a08a376e4f0e60de135f6618d363c81b4ed72132a2f7bdee69fff5897f86faa9194dce163a6e1bbb4242396fd6a19dea24dee13412bb01c17d0decb0b25d62b4d4cba0db62eeb6d84e2b5c78550df3ece0f77efbba2b5ba3c720f9597d3a69d9253fb3b565ea7f9be6fa93932a8581d769775e7762d0b43c8a2792b99fcfd9a81b5d88ab3466add95d6f3f4cbf607245d17fbcfc559c67f7b7c9f445e6f38627ccb2dcad41eee763be23071ff1a0c38a38fd94e19110196f9d73582ac880d4c0d70a2eafca24a552ab1fb0717d874ba564fe4081255363c422190b7bd90d1ec1b2f8436ed44d710477487a7275d4cc806aa4690dd62f9e8deec57ac4279daf84364071d83ee4cb2e1fbc18dd65619b114654f32c1468950b48735706d447a25c14c69d5936ed8d42406a7d3c888f6244dd48d6911d73f943e576739a40b9d5eb1b87b303e88e88e1d259b381f37f122d272f786f2d3729761d149cde2f1a43ba2fc2cbf96619cc8571b5b9abdba041e4d4116f6b852411a24d26361f4db4e08a88d504a2531f5f4b40de69d5ed1fe1e5d8847ac97bdf3bf70c664dceb10b0579745501feb9ab40254d4918374edf295cd066a26903f213eee0a70f30ed2468f5eab5428b3ebeb9d6ac7ad8df40a899245d9f57d00c25de8614943b3eeef10e6b6c684702f10fc19773c086d3e277543dac162f26a5a6cd9d90d87f0d95d5c8f5fc71fc06ec17a6530d6b72ecc014b9c2050573a3847059758f00235326947fd260a1ce714b68d6bbd1e0f6b5c33779655b8e9dd9ee016a239c08143182ebc0b19eadd5f3baa4820eb98891920503aac467c2aea5107d9df9dbc625864488b5b2b75e9dc77d8e153cc5733d7041f725929151057ee114082675774f3922d6595b229237a9c990ef63f476961cc0eb9f05597a19275d64e0dc592d8f2c235fd4b6a1895fdda822a78a2268de92dca4e7e670e350cc2a055f075636a29561b8b85e9c841c1853839dfae9843a39b66f0bc26d392cb56bf2fb440e4f3468af1a40a471d64a9c46a9ff3be543e0ea9f6136efeb19649c9f58f7796178167dd778af10e078b371158d0a7bc0a7f860be596ff1e381639d26f57733d655863b6da4e580cc33a54dd829c2f4954f7190da7249d4d0a122e3d4bf2cf8d4dd6cdfc2e1f93c6d9efd62275f05d16c167a8a064f7c3b55f7abbc23493260c4345cc93fb497e104d99add89db9badb5e4938ae7efaa0c17ba7aa23002895db01c8a11b7e4434a593eaa3c5c7e564880f2a3d7b8851b36a40933451db2e4c4da7810d6d696d6aa8d1c7e01a5e646c3260caf82ab357cfbe629f88d14d1a8c4aebf370dad206f17b93cecb6d5e69ad0cd1fe28e35b3ad8c600bef913c6535db212f9387fea6f994a771db8fc4cb3e3c127815118880f02928ec9fc67b82910b92331291f594dabb34ed182e47ef8e44c279af655d00c57f8792e1c763397bfb12dfd8d595274f4ab7361ca25be0dc23beaf34d6e3f6c933202403a163b6afd798c07e5081e8eda64d17b423f39646a0c96bb15f47171f95428cc59318e4fca6a9eb24006fdf3568bd41fe87d3c9ac3fdc37111cede9769ce6788d2f5dd3412abdd937ca2f67c20aade62bc60b06ce6b4eb6d24d493159aed8e718883db691f240a52426b38946b9d48a0cede99fb1ae5d7c0a25da715b3e7d2bb19e8f43d022895b92f41b50f8344a73e1661b2a1e6e37dc2f78f4d2b2f068ceabddcade1d00481c4915549f0ed02e97a5a9321bc92a51b74c54738dac530eb09938e4a5979769a19448615d47a1a288ca47e9130cb37470c5ff46dd8b4bae85a9323396e6d48b650f112e055f61f393bb354af134657f5d199f44a0e9bc83e3eb88a54724da62e307d3e1249b3b096ab05a4b62e2952b79bb1dc1c8c8c8cfb1b4437ceb1fa818efe988c7f638000e05fddb101350bd4e924be269cfd128fa10ef158d4b0d829562727ec1c37a32d08bc6554910d7e66a2f6a023c694c92bbd0d9f08537ffa338ab86952f326db73dc6593fe733880e18cb2f3a762fc49ca1803620372c0075d2aa3549da7262601818094b7a2ae186072cd68ad3c56d1feec5261178a487de8ac1fde75d382d1c3f12fb084c2116ae02ebe401aa7fd5a2e961ecc36c26e0a392628e12eb4a38396f8cc24f1f3b68cd9419344f8dee492dcbab15df2991d7bb72ab7e731fa5f544888b4c7f28ce77b3e46de344c4cb91cf6de334e7aa80cc558512e508363e35812e5f73b043d373474288048064e15dc427a9312bdcec6e84c84e1ba0a29c840da5e7dffc32fb3fd221b84536899d65bf92ffdd61149c1e738d2777d109b91a886f06c33b06596ecc21ca3956758af69a66d42d2a0bf8f870a6e88ffbfb1a1f89ba6ff4cd96dbd8b91ee9faddbc4ed7b043f3696214e3ea31f93ccb8f09bb9871ee901809f9d35bdcbcf3c71323511f48e89537572ebb45af6f4ee6f5e295c00b060a9b3118370fd6856d0f3728b6e705f347ab38beee1357432712a79ae129aa2ce64fd6631dc54e1fac9868944688a565111b4182ff5df219270d4f90861293a1ad01310937f01f97a2246355c2a66e033469075d35debfc03d7337d3c3abc067139c770373ab1e0cd1675895d2813441c7886855db7aecf8e6c075edac83005ce1f12a4ee9afd2f59e3d528e3de822934f2a039329dfbb3720c9634be8ff69535e25285248f18dc096c6bc71e3659e7c4a8f68722b33d1bf39ae2a8b10c60005273e788cee8e13fa51f641c4b3e2ef3b6eb371b8a683e198f872c2c3e44ed5c641de898575a138c4351f355edae48282cdb595550755f13f2f7288e6ad83efc4aeea7077f6a1bfcec951235f2f287bebd00b207917ea38721bf23e79966e14dc5c77827c46fc2c12725188d75f7dcb3a631676f26393a7f844e672daf6b690bd6e6c856c7485651eefa1d104fd960168d7ce79d581068ad1859971ab72ded5710e3cb52863d3d1abb43f1da7a976852243d6f89df4173d809af452a2ce1be0b10", 0xbff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '-md5sum'}, {0x20, 'rootmode'}], 0xa, "a76c2f8b84cf7dee966e80c2649087968ba640a166c6ed9990de43ee5adca05499e9b80a7291f81f4a1ebe71ac3ec46788c3aef58acb62d16d2d7a39d0cf44ac8f85715a38a4bf3298732d560c1b5b8fc96ec80fdb318550022a53c8b18be0ec0d724ad0"}, 0x80) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, 0x0, &(0x7f0000001000)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x60d18ea6889c169d}}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) [ 265.366085][ T8833] loop3: p1 p2[EZD] p3 p4 [ 265.385647][ T8833] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 265.400490][ T8833] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000010000d07400014000000f40a3aa3e000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000100040000000800150000000000"], 0x44}}, 0x0) 04:36:51 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000100)={@mcast1}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000440)={@mcast1}, 0x14) [ 265.416127][ T8833] loop3: p4 size 32768 extends beyond EOD, truncated [ 265.523771][ T8846] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 265.538657][ T8846] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 04:36:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='batadv0\x00', 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0xdf5, 0xd06c}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000100)={{0x0, 0x7530}, {r1, r2/1000+10000}}, &(0x7f0000000140)) 04:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6c6f7765726469723d2e3a66696c653042e7972413fbe25b06b0085f4f2d16a16f8e5cb6d766"]) 04:36:52 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 265.747557][ T8858] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 265.776555][ T8858] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 265.821543][ T8864] overlayfs: failed to resolve 'file0Bç—$ûâ[°_O-¡oŽ¶×f': -2 [ 265.847364][ T8868] overlayfs: failed to resolve 'file0Bç—$ûâ[°_O-¡oŽ¶×f': -2 [ 266.010878][ T8872] loop3: p1 p2[EZD] p3 p4 [ 266.035907][ T8872] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 266.065929][ T8872] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:52 executing program 2: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa8db6d0a6f433665, 0x8031, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() open$dir(0x0, 0x4880, 0x1f7) 04:36:52 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x10, 0x4, 0x13, 0x0, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x800000}, 0x403) r1 = memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/dev_snmp6\x00') ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:36:52 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(0x0, 0x0) stat(0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) 04:36:52 executing program 1: r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="e04a4f74b80de1fa", 0x8}], 0x1) writev(r0, &(0x7f0000002700)=[{&(0x7f00000001c0)="385e68cb29421c8a", 0x8}], 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, r2+10000000}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480001b2", @ANYRES16=0x0, @ANYBLOB="000000000000000000000b0000001800070008000100000000000c00030000000000000000001c000200080002000000000008000100000000000800010000000000"], 0x48}}, 0x0) [ 266.083957][ T8872] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:52 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 266.316331][ T8896] loop3: p1 p2[EZD] p3 p4 [ 266.322434][ T8896] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 266.345888][ T8896] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 266.356301][ T8896] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="6c6f7765726469723d2e3a66696c653042e7972413fbe25b06b0085f4f2d16a16f8e5cb6"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 04:36:52 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x10, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) keyctl$update(0x2, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) 04:36:52 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:53 executing program 4: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10}}, 0x20}}, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8eea9}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x10, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x4}}}]}, 0x38}}, 0x0) [ 266.620265][ T8913] overlayfs: failed to resolve 'file0Bç—$ûâ[°_O-¡oŽ¶': -2 [ 266.675192][ T8917] overlayfs: failed to resolve 'file0Bç—$ûâ[°_O-¡oŽ¶': -2 04:36:53 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x8, 0x4) 04:36:53 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 266.806357][ T8920] loop3: p1 p2[EZD] p3 p4 [ 266.811967][ T8920] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 266.830226][ T8920] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 266.845696][ T8920] loop3: p4 size 32768 extends beyond EOD, truncated 04:36:53 executing program 4: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) 04:36:53 executing program 2: socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x10, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="110e9dc56e39a45a26f60121dc1fdd31dea0e66b5a65e07b4697790fa2192c0d7583dea06dff9f17f6208b5423746e6b380d874cd8a8f63b8915b5512d966d8d7e13f80fb9e2e570c35d7b7f59", 0x4d, 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f0000001040), 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, 0x0, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '-md5sum'}], 0xa, "a76c2f8b84cf7dee966e80c2649087968ba640a166c6ed9990de43ee5adca05499e9b80a7291"}, 0x39) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfe7a) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x60d18ea6889c169d}}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 04:36:53 executing program 1: r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="e04a4f74b80de1fa", 0x8}], 0x1) writev(r0, &(0x7f0000002700)=[{&(0x7f00000001c0)="385e68cb29421c8a", 0x8}], 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, r2+10000000}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480001b2", @ANYRES16=0x0, @ANYBLOB="000000000000000000000b0000001800070008000100000000000c00030000000000000000001c000200080002000000000008000100000000000800010000000000"], 0x48}}, 0x0) 04:36:53 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:53 executing program 4: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) 04:36:54 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@mode={'mode'}}], [{@uid_eq={'uid'}}, {@pcr={'pcr'}}]}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) [ 267.646905][ T8955] loop3: p1 p2[EZD] p3 p4 [ 267.652284][ T8955] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:36:54 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 267.723882][ T8955] loop3: p3 size 1912633224 extends beyond EOD, truncated 04:36:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r4}) r5 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000480)={0x0, 0x0, 0x0, r5, 0x4}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) [ 267.786158][ T8955] loop3: p4 size 32768 extends beyond EOD, truncated [ 267.874423][ T8969] tmpfs: Unknown parameter 'pcr' 04:36:54 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)={@multicast1, @local}, 0x10) 04:36:54 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:54 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x8, 0x4) 04:36:54 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x10001) fallocate(r5, 0x3, 0x0, 0x2cbd) sendfile(r0, r1, 0x0, 0x13000) 04:36:54 executing program 2: fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYRESHEX]) bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:36:54 executing program 1: socket(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x10, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfe7a) [ 268.447391][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 268.447411][ T27] audit: type=1800 audit(1578458214.904:31): pid=8998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16692 res=0 [ 268.576316][ T9003] loop3: p1 p2[EZD] p3 p4 [ 268.583324][ T9003] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 268.601075][ T9003] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 268.626049][ T9003] loop3: p4 size 32768 extends beyond EOD, truncated [ 268.641016][ T27] audit: type=1804 audit(1578458214.904:32): pid=9001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir227222858/syzkaller.BCXM1L/59/file0" dev="sda1" ino=16692 res=1 [ 268.666946][ T27] audit: type=1804 audit(1578458215.004:33): pid=8998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir227222858/syzkaller.BCXM1L/59/file0" dev="sda1" ino=16692 res=1 [ 268.685390][ T9010] overlayfs: unrecognized mount option "0xffffffffffffffff" or missing value 04:36:55 executing program 4: mknod(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@metacopy_on='metacopy=on', 0x5c}, {@xino_auto='xino=auto'}]}) 04:36:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {0x0, 0x0, 0x0, [], 0xff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x20}]}}) [ 268.715520][ T27] audit: type=1804 audit(1578458215.154:34): pid=9001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir227222858/syzkaller.BCXM1L/59/file0" dev="sda1" ino=16692 res=1 [ 268.766090][ T9018] overlayfs: unrecognized mount option "0xffffffffffffffff" or missing value 04:36:55 executing program 0: 04:36:55 executing program 3: stat(&(0x7f0000000240)='./file0/file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:36:55 executing program 2: [ 269.006089][ T9030] overlayfs: unrecognized mount option "metacopy=on\xino=auto" or missing value 04:36:55 executing program 0: [ 269.064391][ T9027] overlayfs: unrecognized mount option "metacopy=on\xino=auto" or missing value 04:36:55 executing program 4: 04:36:55 executing program 2: [ 269.251737][ T9040] loop3: p1 p2[EZD] p3 p4 [ 269.306009][ T9040] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 269.346219][ T9040] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 269.449974][ T9040] loop3: p4 size 32768 extends beyond EOD, truncated [ 269.582394][ T7871] ================================================================== [ 269.590696][ T7871] BUG: KCSAN: data-race in do_dentry_open / kernfs_refresh_inode [ 269.598406][ T7871] [ 269.600754][ T7871] read to 0xffff8880b60b74f0 of 2 bytes by task 7975 on cpu 1: [ 269.608303][ T7871] do_dentry_open+0xf0/0x970 [ 269.612891][ T7871] vfs_open+0x62/0x80 [ 269.617124][ T7871] path_openat+0xf9f/0x3580 [ 269.621704][ T7871] do_filp_open+0x11e/0x1b0 [ 269.626210][ T7871] do_sys_open+0x3b3/0x4f0 [ 269.630628][ T7871] __x64_sys_open+0x55/0x70 [ 269.635127][ T7871] do_syscall_64+0xcc/0x3a0 [ 269.639627][ T7871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.645510][ T7871] [ 269.647835][ T7871] write to 0xffff8880b60b74f0 of 2 bytes by task 7871 on cpu 0: [ 269.655456][ T7871] kernfs_refresh_inode+0x42/0x140 [ 269.660576][ T7871] kernfs_iop_getattr+0x68/0x90 [ 269.665419][ T7871] vfs_getattr_nosec+0x12e/0x170 [ 269.670357][ T7871] vfs_getattr+0x54/0x70 [ 269.674602][ T7871] vfs_statx+0x102/0x190 [ 269.678835][ T7871] __do_sys_newstat+0x51/0xb0 [ 269.683503][ T7871] __x64_sys_newstat+0x3a/0x50 [ 269.688389][ T7871] do_syscall_64+0xcc/0x3a0 [ 269.692893][ T7871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.698859][ T7871] [ 269.701198][ T7871] Reported by Kernel Concurrency Sanitizer on: [ 269.707350][ T7871] CPU: 0 PID: 7871 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 269.715148][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.725189][ T7871] ================================================================== [ 269.733238][ T7871] Kernel panic - not syncing: panic_on_warn set ... [ 269.739821][ T7871] CPU: 0 PID: 7871 Comm: udevd Not tainted 5.5.0-rc1-syzkaller #0 [ 269.747615][ T7871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.758004][ T7871] Call Trace: [ 269.761287][ T7871] dump_stack+0x11d/0x181 [ 269.765612][ T7871] panic+0x210/0x640 [ 269.769506][ T7871] ? vprintk_func+0x8d/0x140 [ 269.774093][ T7871] kcsan_report.cold+0xc/0xd [ 269.778682][ T7871] kcsan_setup_watchpoint+0x3fe/0x460 [ 269.784052][ T7871] __tsan_unaligned_write2+0xc7/0x110 [ 269.789603][ T7871] kernfs_refresh_inode+0x42/0x140 [ 269.794727][ T7871] kernfs_iop_getattr+0x68/0x90 [ 269.799583][ T7871] vfs_getattr_nosec+0x12e/0x170 [ 269.804524][ T7871] ? kernfs_refresh_inode+0x140/0x140 [ 269.809894][ T7871] vfs_getattr+0x54/0x70 [ 269.814143][ T7871] vfs_statx+0x102/0x190 [ 269.818506][ T7871] __do_sys_newstat+0x51/0xb0 [ 269.823193][ T7871] __x64_sys_newstat+0x3a/0x50 [ 269.827966][ T7871] do_syscall_64+0xcc/0x3a0 [ 269.832477][ T7871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.838374][ T7871] RIP: 0033:0x7ff50c4a5c65 [ 269.842790][ T7871] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 269.862419][ T7871] RSP: 002b:00007ffcaae13f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 269.871447][ T7871] RAX: ffffffffffffffda RBX: 0000000001eb5250 RCX: 00007ff50c4a5c65 [ 269.879414][ T7871] RDX: 00007ffcaae13fa0 RSI: 00007ffcaae13fa0 RDI: 00007ffcaae14430 [ 269.887407][ T7871] RBP: 00007ffcaae14870 R08: 000000000041f4f1 R09: 00007ff50c4fc7d0 [ 269.895370][ T7871] R10: 7269762f73656369 R11: 0000000000000246 R12: 0000000000000004 [ 269.903350][ T7871] R13: 00007ffcaae14877 R14: 0000000001eb5250 R15: 0000000001ebb3e0 [ 269.912613][ T7871] Kernel Offset: disabled [ 269.916979][ T7871] Rebooting in 86400 seconds..