, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 584.463047][ T787] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 584.491793][ T787] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 584.510628][ T787] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:32:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f182b, 0x30051, r4, 0x0) [ 584.606283][ T751] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 584.777795][ T792] loop1: p1 < > p2 p3 < p5 p6 > p4 04:32:57 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:32:57 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 584.895046][ T792] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 584.908693][ T825] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 584.944077][ T825] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:32:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f192b, 0x30051, r4, 0x0) [ 585.044127][ T792] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 585.054829][ T825] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:32:58 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 585.173244][ T848] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 585.193119][ T848] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 585.294639][ T848] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:32:58 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 585.529412][ T857] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 585.548978][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 585.571760][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 585.571830][ T857] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 585.616343][ T857] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 585.636533][ T867] loop4: p1 < > p2 p3 < p5 p6 > p4 04:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1a2b, 0x30051, r4, 0x0) 04:32:58 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:32:58 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 585.734896][ T867] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 585.747046][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 585.803109][ T867] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:32:58 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 586.033907][ T938] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 586.048657][ T938] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 586.075487][ T938] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:32:59 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 586.298635][ T941] loop1: p1 < > p2 p3 < p5 p6 > p4 04:32:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1b2b, 0x30051, r4, 0x0) [ 586.349080][ T941] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:32:59 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 586.413677][ T986] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 586.431261][ T986] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 586.471620][ T941] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 586.491038][ T986] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 586.503674][ T977] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 586.545700][ T978] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 586.565534][ T977] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 586.587461][ T978] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:32:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1c2b, 0x30051, r4, 0x0) [ 586.606952][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 586.649978][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 586.708364][ T977] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 586.735313][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 586.745801][ T978] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:32:59 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 586.933101][ T1028] loop4: p1 < > p2 p3 < p5 p6 > p4 04:32:59 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 587.009584][ T1028] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:00 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 587.120807][ T1028] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:00 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1d2b, 0x30051, r4, 0x0) [ 587.262974][ T1068] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 587.273526][ T1068] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 587.368995][ T1068] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1e2b, 0x30051, r4, 0x0) [ 587.519538][ T1072] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 587.629889][ T1072] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 587.685588][ T1107] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:00 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:00 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 587.745371][ T1107] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 587.838186][ T1072] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 587.865302][ T1120] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 587.889241][ T1120] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 587.931081][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff2f1f2b, 0x30051, r4, 0x0) [ 587.978233][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 587.985922][ T1107] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 588.003353][ T1152] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 588.010558][ T1152] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 588.031770][ T1152] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 588.049885][ T1120] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 588.063824][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:01 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 588.337465][ T1165] loop4: p1 < > p2 p3 < p5 p6 > p4 04:33:01 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 588.427313][ T1165] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:01 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f002b, 0x30051, r4, 0x0) [ 588.563749][ T1165] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:01 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 588.651891][ T1213] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 588.659255][ T1213] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 588.676324][ T1205] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f012b, 0x30051, r4, 0x0) [ 588.773514][ T1205] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 588.797345][ T1213] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 588.950711][ T1205] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:01 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 589.045632][ T1258] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 589.104492][ T1258] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 589.157708][ T1258] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 589.167442][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 589.174668][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 589.188243][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f022b, 0x30051, r4, 0x0) [ 589.304041][ T1261] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:02 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 589.408270][ T1261] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:02 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 589.532963][ T1261] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f032b, 0x30051, r4, 0x0) [ 589.635983][ T1316] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 589.690593][ T1316] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 589.733300][ T1326] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 589.747180][ T1326] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:02 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 589.839428][ T1316] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 589.871103][ T1326] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:02 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f042b, 0x30051, r4, 0x0) [ 590.231834][ T1348] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 590.303813][ T1348] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:03 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:03 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 590.608858][ T1348] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 590.632396][ T1377] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 590.713146][ T1377] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 590.805578][ T1377] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 590.821993][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 590.834037][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f052b, 0x30051, r4, 0x0) 04:33:03 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 590.857577][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 590.909074][ T1426] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 590.942663][ T1426] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 590.988874][ T1380] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 591.013469][ T1380] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 591.058940][ T1380] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 591.070219][ T1426] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:04 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:04 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 591.394991][ T1446] loop4: p1 < > p2 p3 < p5 p6 > p4 04:33:04 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 591.458224][ T1446] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f062b, 0x30051, r4, 0x0) [ 591.609996][ T1446] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 591.648495][ T1468] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 591.718626][ T1468] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 591.745375][ T1482] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 591.779004][ T1482] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 591.799637][ T1468] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 591.860564][ T1482] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f072b, 0x30051, r4, 0x0) [ 592.030070][ T1514] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 592.038471][ T1514] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:05 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 592.144042][ T1511] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 592.179921][ T1514] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 592.209408][ T1511] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 592.280588][ T1511] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 592.332580][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:05 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 592.353180][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 592.375597][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:05 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:05 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f082b, 0x30051, r4, 0x0) 04:33:05 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 592.613640][ T1593] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 592.656003][ T1593] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 592.824957][ T1593] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 592.855799][ T1624] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 592.884614][ T1624] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 592.939376][ T1624] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 593.021056][ T1629] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f092b, 0x30051, r4, 0x0) [ 593.121087][ T1629] loop2: p2 size 1073741824 extends beyond EOD, [ 593.133099][ T1634] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 593.164487][ T1629] truncated [ 593.276527][ T1631] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 593.313667][ T1634] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 593.346268][ T1629] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:06 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 593.359204][ T1631] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0a2b, 0x30051, r4, 0x0) 04:33:06 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 593.551439][ T1631] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 593.586095][ T1634] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 593.683338][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:06 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:06 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:06 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 593.735445][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0b2b, 0x30051, r4, 0x0) [ 593.808888][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 593.851925][ T1734] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 593.860303][ T1734] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 593.882624][ T1734] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0c2b, 0x30051, r4, 0x0) [ 593.995753][ T1725] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 594.030277][ T1725] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:07 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 594.120053][ T1725] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 594.156937][ T1773] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 594.286975][ T1773] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0d2b, 0x30051, r4, 0x0) [ 594.391465][ T1773] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 594.485603][ T1805] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 594.593227][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0e2b, 0x30051, r4, 0x0) 04:33:07 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 594.616069][ T1804] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 594.630613][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 594.646083][ T1805] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 594.704448][ T1805] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 594.716484][ T1804] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 594.753094][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:07 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:07 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 595.021236][ T1804] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:08 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f0f2b, 0x30051, r4, 0x0) 04:33:08 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 595.257631][ T1868] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:08 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 595.306713][ T1868] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 595.384557][ T1892] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 595.469022][ T1892] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 595.583712][ T1901] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 595.598286][ T1868] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 595.653642][ T1892] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 595.672869][ T1901] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 595.715993][ T1911] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 595.773546][ T1901] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:08 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 595.883268][ T1911] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:08 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:08 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 596.076850][ T1911] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f102b, 0x30051, r4, 0x0) 04:33:09 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:09 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:09 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f112b, 0x30051, r4, 0x0) [ 596.601372][ T1973] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 596.621698][ T1973] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 596.696519][ T1973] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 596.737539][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 596.748618][ T1988] loop4: p1 < > p2 p3 < p5 p6 > p4 04:33:09 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 596.784601][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 596.794155][ T1993] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 596.797398][ T1988] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f122b, 0x30051, r4, 0x0) [ 596.827012][ T1993] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 596.888367][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 596.889028][ T1993] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 596.933998][ T1988] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f132b, 0x30051, r4, 0x0) 04:33:10 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e9022"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:10 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:10 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:10 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 597.501165][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 597.514659][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 597.556222][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f142b, 0x30051, r4, 0x0) [ 597.704348][ T2092] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 597.867528][ T2049] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 597.873400][ T2092] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 597.926247][ T2107] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 597.937795][ T2049] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 597.985552][ T2107] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 598.027104][ T2092] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 598.041949][ T2049] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 598.064722][ T2108] loop4: p1 < > p2 p3 < p5 p6 > p4 04:33:10 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 598.087763][ T2108] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 598.177348][ T2107] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f152b, 0x30051, r4, 0x0) 04:33:11 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 598.310134][ T2108] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:11 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:33:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f162b, 0x30051, r4, 0x0) 04:33:11 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e9022"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:11 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:11 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f172b, 0x30051, r4, 0x0) [ 598.884968][ T2170] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 598.899793][ T2170] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 598.938562][ T2170] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:12 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) 04:33:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f182b, 0x30051, r4, 0x0) [ 599.268423][ T2202] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 599.300792][ T2225] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 599.325984][ T2225] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 599.333236][ T2202] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:12 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 599.388968][ T2232] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 599.405073][ T2225] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 599.456734][ T2232] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:12 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) [ 599.576924][ T2202] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f192b, 0x30051, r4, 0x0) [ 599.641966][ T2232] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:12 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e9022"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:12 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:13 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:13 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) 04:33:13 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) 04:33:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1a2b, 0x30051, r4, 0x0) [ 600.533519][ T2295] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 600.595769][ T2295] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 600.688062][ T2294] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1b2b, 0x30051, r4, 0x0) [ 600.725007][ T2294] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 600.751466][ T2295] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:13 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x0) [ 600.774624][ T2307] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 600.790227][ T2307] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 600.846575][ T2307] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:13 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 600.957830][ T2294] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:14 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1c2b, 0x30051, r4, 0x0) 04:33:14 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:14 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1d2b, 0x30051, r4, 0x0) 04:33:14 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02", 0x1b) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 601.451351][ T2365] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 601.493782][ T2365] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 601.608107][ T2365] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 601.697171][ T2399] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1e2b, 0x30051, r4, 0x0) [ 601.765089][ T2399] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 601.783644][ T2402] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 601.825483][ T2400] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 601.853451][ T2420] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 601.881750][ T2402] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 601.919276][ T2400] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 601.935165][ T2420] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:33:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff3f1f2b, 0x30051, r4, 0x0) [ 601.979142][ T2399] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 602.047119][ T2402] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 602.088590][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 602.096956][ T2400] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 602.110524][ T2420] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:33:15 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37c", 0x19) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 602.152240][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 602.275600][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f002b, 0x30051, r4, 0x0) 04:33:15 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:15 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:15 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:15 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 602.754103][ T2502] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 602.799616][ T2502] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f012b, 0x30051, r4, 0x0) [ 602.845565][ T2521] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 602.857082][ T2502] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 602.878177][ T2521] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 602.915509][ T2541] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 602.945890][ T2541] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 602.974659][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 602.983847][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 602.998118][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 603.074952][ T2521] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 603.129192][ T2541] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 603.143533][ T2557] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 603.164533][ T2553] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 603.172058][ T2557] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 603.196884][ T2553] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 603.277321][ T2553] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f022b, 0x30051, r4, 0x0) 04:33:16 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:16 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:16 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:16 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:16 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f032b, 0x30051, r4, 0x0) [ 603.983234][ T2613] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 604.056867][ T2613] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 604.063902][ T2636] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 604.087264][ T2636] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 604.133533][ T2649] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 604.160435][ T2649] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 604.184065][ T2636] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f042b, 0x30051, r4, 0x0) [ 604.255564][ T2649] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 604.282136][ T2613] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 604.352472][ T2657] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 604.467224][ T2666] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 604.483490][ T2657] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. 04:33:17 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f052b, 0x30051, r4, 0x0) [ 604.714211][ T2666] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:17 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:17 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:17 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 604.845278][ T2666] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 604.918062][ T3879] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 604.985061][ T3879] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 605.011845][ T3879] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 605.032770][ T2713] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 605.053972][ T2713] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 605.112010][ T2713] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:18 executing program 5: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f062b, 0x30051, r4, 0x0) [ 605.346621][ T2753] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 605.371462][ T2753] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 605.433518][ T2748] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 605.493197][ T2748] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 605.498150][ T2753] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 605.505733][ T2775] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 605.561752][ T2748] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 605.572411][ T2775] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:18 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) [ 605.631463][ T2779] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 605.742331][ T2779] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 605.745052][ T2775] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f072b, 0x30051, r4, 0x0) 04:33:18 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 605.919980][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 605.958159][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 605.984989][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:18 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:18 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 606.221048][ T2825] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 606.237195][ T3879] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 606.244721][ T3879] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f082b, 0x30051, r4, 0x0) 04:33:19 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 606.273055][ T3879] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 606.298093][ T2825] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 606.413055][ T2869] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 606.432350][ T2869] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 606.483615][ T2869] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 606.527217][ T2825] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 606.581010][ T2862] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 606.639344][ T2862] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 606.712563][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 606.763301][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 606.785237][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f092b, 0x30051, r4, 0x0) [ 606.822852][ T2897] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 606.837569][ T2923] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 606.852937][ T2897] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 606.859109][ T2862] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 606.896825][ T2897] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:19 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) [ 607.022564][ T2923] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. 04:33:20 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:20 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:20 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0a2b, 0x30051, r4, 0x0) [ 607.513156][ T2956] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:20 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 607.575133][ T2956] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 607.641835][ T2979] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 607.657345][ T2979] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 607.696539][ T2979] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 607.797791][ T2956] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0b2b, 0x30051, r4, 0x0) [ 607.846610][ T3002] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 607.866818][ T2977] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 607.910166][ T2977] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 608.020072][ T3002] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 608.039393][ T2977] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:21 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:21 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) [ 608.224999][ T3004] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0c2b, 0x30051, r4, 0x0) [ 608.264146][ T3004] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:21 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 608.387932][ T3004] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:21 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 608.528081][ T3033] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 608.563666][ T3033] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 608.626385][ T3033] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0d2b, 0x30051, r4, 0x0) [ 608.855204][ T3047] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 608.967242][ T3047] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:21 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 609.165150][ T3047] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:22 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 609.324404][ T3073] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 609.379386][ T3073] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:22 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) [ 609.433721][ T3101] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0e2b, 0x30051, r4, 0x0) [ 609.488187][ T3101] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 609.516994][ T3120] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 609.586159][ T3101] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 609.607435][ T3073] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 609.652871][ T3120] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 609.675251][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 609.734654][ T3133] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 609.736980][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 609.758192][ T3133] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:22 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 609.799030][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 609.822280][ T3148] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 609.838386][ T3148] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:22 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 609.960958][ T3133] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 610.007035][ T3148] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f0f2b, 0x30051, r4, 0x0) 04:33:23 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) [ 610.413666][ T3194] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:23 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:23 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 610.506312][ T3194] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:23 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) [ 610.623796][ T3194] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f102b, 0x30051, r4, 0x0) [ 610.953857][ T3247] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 610.974285][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 611.006918][ T3247] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 611.013809][ T3250] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 611.022195][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 611.074174][ T3250] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 611.093415][ T3253] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:24 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f112b, 0x30051, r4, 0x0) [ 611.127679][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 611.154091][ T3247] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 611.155535][ T3253] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 611.198087][ T3250] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:24 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 611.402175][ T3253] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:24 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) 04:33:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f122b, 0x30051, r4, 0x0) 04:33:24 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:24 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d775"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:24 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) [ 611.937350][ T3342] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 612.025161][ T3342] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 612.042352][ T3366] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 612.065931][ T3366] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 612.133566][ T3388] overlayfs: failed to resolve './file0': -2 [ 612.142863][ T3378] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f132b, 0x30051, r4, 0x0) [ 612.194270][ T3366] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 612.203098][ T3392] overlayfs: failed to resolve './file0': -2 [ 612.215284][ T3378] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 612.243162][ T3342] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 612.245028][ T3374] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 612.292367][ T3374] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:25 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 612.399378][ T3378] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 612.460605][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 612.523483][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 612.554241][ T3374] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 612.578585][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:25 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d775"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:25 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f142b, 0x30051, r4, 0x0) [ 612.785701][ T3452] overlayfs: failed to resolve './file0': -2 [ 612.811370][ T3452] overlayfs: failed to resolve './file0': -2 04:33:25 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:25 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:25 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 613.121530][ T3489] overlayfs: failed to resolve './file0': -2 [ 613.144405][ T3489] overlayfs: failed to resolve './file0': -2 [ 613.155248][ T3474] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f152b, 0x30051, r4, 0x0) [ 613.180737][ T3474] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 613.259617][ T3472] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 613.276634][ T3474] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 613.301050][ T3472] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:26 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 613.428669][ T3472] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 613.438792][ T3494] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 613.468885][ T3494] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 613.536160][ T3494] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:26 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 613.793697][ T3514] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f162b, 0x30051, r4, 0x0) 04:33:26 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d775"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 613.881923][ T3514] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:26 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:26 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 614.002033][ T3514] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 614.011612][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 614.038885][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:27 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 614.129655][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f172b, 0x30051, r4, 0x0) 04:33:27 executing program 4: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:27 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 614.413646][ T3576] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 614.470768][ T3576] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 614.476688][ T3595] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 614.546477][ T3576] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 614.552870][ T3595] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 614.636476][ T3594] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 614.676401][ T3594] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 614.682523][ T3595] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f182b, 0x30051, r4, 0x0) [ 614.721652][ T3594] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 614.732021][ T3634] overlayfs: failed to resolve './file1': -2 [ 614.770890][ T3624] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 614.848741][ T3879] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 614.888070][ T3624] overlayfs: failed to resolve './file1': -2 [ 614.903858][ T3879] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:27 executing program 4: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:27 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 614.997902][ T3879] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 615.072981][ T3635] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f192b, 0x30051, r4, 0x0) [ 615.115524][ T3635] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 615.225762][ T3635] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:28 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e9022"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:28 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 615.330013][ T3685] overlayfs: failed to resolve './file1': -2 [ 615.377050][ T3685] overlayfs: failed to resolve './file1': -2 [ 615.394046][ T3684] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 615.461676][ T3684] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1a2b, 0x30051, r4, 0x0) 04:33:28 executing program 4: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 615.627535][ T3684] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 615.754095][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 615.787000][ T3698] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 615.813098][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:28 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 615.852964][ T3698] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 615.883991][ T3740] overlayfs: failed to resolve './file1': -2 04:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1b2b, 0x30051, r4, 0x0) [ 615.904275][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 615.904660][ T3713] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 615.932053][ T3747] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 615.967035][ T3713] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 615.987594][ T3698] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:28 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 616.115910][ T3713] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 616.133709][ T3747] overlayfs: failed to resolve './file1': -2 04:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1c2b, 0x30051, r4, 0x0) 04:33:29 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 616.352388][ T3768] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 616.373467][ T3768] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 616.422927][ T3768] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 616.512275][ T3780] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 616.540634][ T3797] overlayfs: failed to resolve './file1': -2 04:33:29 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 616.584344][ T3780] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 616.589708][ T3801] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 616.655527][ T3801] overlayfs: failed to resolve './file1': -2 04:33:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x29, 0x101000) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_getevents(r0, 0x2, 0x8000000000002b9, &(0x7f0000d83f60), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000001700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) clock_gettime(0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)=""/195, 0xc3}, {&(0x7f0000000400)=""/144, 0x90}, {0x0}], 0x3, &(0x7f00000004c0)=""/213, 0xd5}, 0xf753}, {{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000dc0)=[{&(0x7f00000005c0)=""/174, 0xae}, {&(0x7f0000000680)=""/215, 0xd7}, {&(0x7f0000000780)=""/166, 0xa6}, {&(0x7f0000000840)=""/55, 0x37}, {&(0x7f0000000880)=""/186, 0xba}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000a00)=""/239, 0xef}, {&(0x7f0000000b00)=""/166, 0xa6}, {&(0x7f0000000bc0)=""/55, 0x37}], 0x9}, 0x7ff}], 0x2, 0x10002, &(0x7f0000000d80)={r2, r3+60000000}) r4 = add_key$user(&(0x7f0000000c00)='user\x00', &(0x7f0000000c40)={'syz', 0x0}, &(0x7f0000000e80)="8a707edbe8cc8c5d4a42fe1f8eedb9989cc41eee75b1fb821a508315a101ed36ad6ca6c25f05b9ecb23687bc2d10fabe840ad6e8231d751f95f32337c3dd59f400aff744ef1b6663d9fd6c67c9c72b43dae892f0eaaba748c783b5349eeb08d58cfd7d1461126492bc66d8e784e41fe8d59d5e27d305971f90822eff4f2eb40f81b4ee91e3", 0x85, 0xfffffffffffffffe) openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x0, 0x0) keyctl$setperm(0x5, r4, 0x2000800) shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="776f726b6469723d65726469723d2e2f6275732c75707077726449723d7fe35753a884f5a5b4e0b18181006275732c000000000000000000000000a22246cc50aab1e6c430abff2db3738ad46c794f276e4c5d1c13f12fc8036677f522efdf70715511920a3d3612a5a3b8121826a3601112486fbc8c204d7270df47a06888b7a461cac107e08367c2ff93952c94ca7ba2829eb51258ce849b0ff964c29aaf2e7e760598eabdeb9e276de41983a0"]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0xc8080, &(0x7f0000000140)={[{@index_on='index=on'}, {@index_on='index=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_off='index=off'}]}) 04:33:29 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 616.743209][ T3879] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 616.772865][ T3780] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 616.787951][ T3879] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 616.824830][ T3879] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1d2b, 0x30051, r4, 0x0) [ 617.074829][ T3855] overlayfs: unrecognized mount option "uppwrdIr=ãWS¨„õ¥´à±" or missing value [ 617.102171][ T3833] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:30 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 617.124659][ T3852] overlayfs: failed to resolve './file1': -2 04:33:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1e2b, 0x30051, r4, 0x0) [ 617.171617][ T3856] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 617.195076][ T3833] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:30 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 617.254983][ T3856] overlayfs: failed to resolve './file1': -2 04:33:30 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 617.310208][ T3833] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff4f1f2b, 0x30051, r4, 0x0) [ 617.643573][ T3880] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 617.690714][ T3901] overlayfs: failed to resolve './file1': -2 [ 617.707824][ T3901] overlayfs: failed to resolve './file1': -2 [ 617.741996][ T3895] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 617.750686][ T3880] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:30 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 617.785242][ T3895] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:30 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:30 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 617.867142][ T3880] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 617.872381][ T3895] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f002b, 0x30051, r4, 0x0) [ 618.142258][ T3919] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 618.226571][ T3919] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:31 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 618.362352][ T3919] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:31 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:31 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 618.512701][ T3941] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:31 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 618.586388][ T3941] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f012b, 0x30051, r4, 0x0) [ 618.711599][ T3941] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 618.854005][ T3879] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:31 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 618.890937][ T3879] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 618.913091][ T3980] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 618.927732][ T3980] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 618.986546][ T3980] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 619.011945][ T3879] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 619.061719][ T3981] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 619.078393][ T3981] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:32 executing program 2: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 619.135161][ T3981] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 619.206227][ T4011] overlayfs: failed to resolve './file0': -2 [ 619.251219][ T4011] overlayfs: failed to resolve './file0': -2 04:33:32 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:32 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f022b, 0x30051, r4, 0x0) 04:33:32 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 619.671567][ T4034] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:32 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 619.698186][ T4034] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 619.767074][ T4049] overlayfs: failed to resolve './file0': -2 04:33:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f032b, 0x30051, r4, 0x0) [ 619.809001][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 619.816483][ T4059] overlayfs: failed to resolve './file0': -2 [ 619.821085][ T4034] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 619.826495][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 619.851646][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:32 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 619.881203][ T4047] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 619.914733][ T4047] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 620.115381][ T4047] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 620.146605][ T4105] overlayfs: failed to resolve './file0': -2 04:33:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f042b, 0x30051, r4, 0x0) [ 620.220201][ T4110] overlayfs: failed to resolve './file0': -2 [ 620.331115][ T4104] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:33 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 620.430642][ T4104] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 620.487214][ T4108] loop5: p1 < > p2 p3 < p5 p6 > p4 04:33:33 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 620.519893][ T4108] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:33:33 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 620.622201][ T4104] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 620.632606][ T4108] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:33:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f052b, 0x30051, r4, 0x0) 04:33:33 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:33 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 621.062078][ T4155] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 621.097929][ T4155] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 621.181014][ T4155] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f062b, 0x30051, r4, 0x0) 04:33:34 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 621.353250][ T4159] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 621.487560][ T4159] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:33:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f072b, 0x30051, r4, 0x0) [ 621.581232][ T4183] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 621.589882][ T4199] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 621.604757][ T4199] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 621.649034][ T4183] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 621.670471][ T4159] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 621.714468][ T4183] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 621.780142][ T3879] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 621.832140][ T3879] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:34 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:34 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 621.921006][ T3879] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:34 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:34 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:35 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f082b, 0x30051, r4, 0x0) 04:33:35 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 622.448384][ T4268] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 622.460431][ T4268] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f092b, 0x30051, r4, 0x0) [ 622.530986][ T4274] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 622.545423][ T4274] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 622.563419][ T4268] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 622.569264][ T4260] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 622.616320][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 622.622716][ T4260] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 622.631807][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 622.646170][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:35 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 622.685068][ T4270] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:35 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 622.759120][ T4270] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 622.768765][ T4260] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:35 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 622.881016][ T4270] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 622.988850][ T4326] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 623.017333][ T4326] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0a2b, 0x30051, r4, 0x0) [ 623.135429][ T4326] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:36 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:36 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:36 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 623.315450][ T3879] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 623.354776][ T4341] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 623.354889][ T3879] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:36 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 623.404978][ T4341] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 623.501975][ T3879] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:36 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0b2b, 0x30051, r4, 0x0) [ 623.653580][ T4389] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 623.662980][ T4389] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 623.685858][ T4389] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:36 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 623.859784][ T4423] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 623.875326][ T4423] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. 04:33:36 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:36 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 623.913108][ T4383] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 623.928500][ T4383] loop1: partition table partially beyond EOD, truncated 04:33:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0c2b, 0x30051, r4, 0x0) [ 623.981581][ T4398] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 624.013965][ T4383] loop1: p1 start 1 is beyond EOD, truncated [ 624.029797][ T4383] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 624.051344][ T4383] loop1: p3 size 2 extends beyond EOD, truncated [ 624.055724][ T4398] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 624.088670][ T4383] loop1: p4 size 32768 extends beyond EOD, truncated [ 624.133110][ T4383] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 624.133187][ T4432] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 624.134264][ T4432] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 624.156346][ T4432] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 624.230052][ T4398] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 624.252690][ T4383] loop1: p6 size 32768 extends beyond EOD, truncated 04:33:37 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 624.337311][ T4462] overlayfs: missing 'lowerdir' 04:33:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0d2b, 0x30051, r4, 0x0) [ 624.519338][ T4467] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 624.559276][ T4467] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. 04:33:37 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:37 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:37 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:37 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 624.731822][ T4470] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 624.739073][ T4470] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 624.796258][ T4470] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 624.929443][ T4487] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 624.969815][ T4487] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 625.030320][ T4487] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 625.041162][ T4505] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 625.061603][ T4505] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 625.069297][ T4514] overlayfs: missing 'lowerdir' 04:33:38 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 625.145531][ T4505] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0e2b, 0x30051, r4, 0x0) 04:33:38 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:38 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 625.481970][ T4537] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 625.497573][ T4537] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 625.579027][ T4537] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 625.638884][ T4559] overlayfs: missing 'lowerdir' [ 625.677406][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f0f2b, 0x30051, r4, 0x0) 04:33:38 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 625.709101][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:38 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:38 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 625.760526][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:38 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:33:38 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f102b, 0x30051, r4, 0x0) [ 626.111552][ T4598] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 626.167031][ T4615] overlayfs: unrecognized mount option "./bus" or missing value [ 626.170342][ T4598] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 626.222570][ T4606] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 626.243401][ T4606] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 626.279099][ T4607] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 626.325113][ T4598] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 626.336434][ T4607] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 626.363468][ T4606] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:39 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f112b, 0x30051, r4, 0x0) [ 626.463479][ T4607] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 626.471311][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 626.510556][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 626.549304][ T4635] overlayfs: unrecognized mount option "./bus" or missing value [ 626.592957][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:39 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 626.842636][ T4670] overlayfs: failed to resolve './file0': -2 [ 626.880501][ T4673] overlayfs: failed to resolve './file0': -2 04:33:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f122b, 0x30051, r4, 0x0) 04:33:39 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:39 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:33:39 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 626.988356][ T4690] overlayfs: unrecognized mount option "./bus" or missing value 04:33:39 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 627.053303][ T4691] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 627.072248][ T4691] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 627.144817][ T4691] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f132b, 0x30051, r4, 0x0) [ 627.250493][ T4709] overlayfs: failed to resolve './file0': -2 [ 627.292157][ T4709] overlayfs: failed to resolve './file0': -2 04:33:40 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 627.372156][ T4707] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 627.414274][ T4728] overlayfs: failed to resolve './file0': -2 [ 627.422477][ T4718] overlayfs: unrecognized mount option "./bus" or missing value [ 627.423053][ T4728] overlayfs: failed to resolve './file0': -2 04:33:40 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 627.465186][ T4707] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:40 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 627.513551][ T4708] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 627.605742][ T4708] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 627.637153][ T4737] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 627.644165][ T4737] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:33:40 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 627.657122][ T4737] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 627.666961][ T4707] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f142b, 0x30051, r4, 0x0) 04:33:40 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 627.787443][ T4708] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:40 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 627.962689][ T4771] overlayfs: unrecognized mount option "./bus" or missing value 04:33:41 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:41 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:33:41 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:41 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f152b, 0x30051, r4, 0x0) [ 628.294556][ T4785] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:41 executing program 5: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 628.315576][ T4785] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 628.414183][ T4785] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 628.440472][ T4809] overlayfs: failed to resolve './file1': -2 [ 628.472506][ T4816] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 628.492077][ T4794] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 628.499043][ T4816] overlayfs: failed to resolve './file1': -2 [ 628.510055][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 628.519050][ T4794] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 628.553069][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 628.564587][ T4817] overlayfs: unrecognized mount option "./bus" or missing value 04:33:41 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 628.635252][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 628.665947][ T4829] loop1: p1 < > p2 p3 < p5 p6 > p4 04:33:41 executing program 5: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f162b, 0x30051, r4, 0x0) 04:33:41 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 628.752638][ T4794] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 628.806763][ T4829] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 628.849461][ T4856] overlayfs: failed to resolve './file1': -2 [ 628.881427][ T4856] overlayfs: failed to resolve './file1': -2 04:33:41 executing program 5: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 628.953966][ T4829] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f172b, 0x30051, r4, 0x0) [ 629.039343][ T4864] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 629.066201][ T4872] overlayfs: failed to resolve './file1': -2 [ 629.085374][ T4864] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 629.087048][ T4872] overlayfs: failed to resolve './file1': -2 [ 629.220722][ T4874] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore [ 629.275684][ T4864] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 629.303429][ T4874] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:33:42 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:42 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f182b, 0x30051, r4, 0x0) 04:33:42 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:42 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:42 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 629.556812][ T4913] overlayfs: failed to resolve './file1': -2 [ 629.590838][ T4913] overlayfs: failed to resolve './file1': -2 [ 629.631042][ T4914] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 629.659178][ T4914] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:42 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 629.744618][ T4921] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore [ 629.765990][ T4914] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 629.833227][ T4921] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 629.889487][ T4927] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 629.929370][ T4927] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 629.968284][ T4927] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:33:42 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 630.040008][ T4939] loop3: p1 < > p2 p3 < p5 p6 > p4 04:33:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f192b, 0x30051, r4, 0x0) [ 630.169322][ T4939] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 630.170232][ T4958] overlayfs: failed to resolve './file1': -2 [ 630.186605][ T4958] overlayfs: failed to resolve './file1': -2 04:33:43 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:43 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 630.236860][ T4939] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:33:43 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 630.438037][ T4989] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore [ 630.447005][ T4989] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 630.461677][ T4983] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 630.473057][ T4992] overlayfs: failed to resolve './file1': -2 [ 630.478640][ T4983] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:43 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 630.491770][ T4992] overlayfs: failed to resolve './file1': -2 04:33:43 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1a2b, 0x30051, r4, 0x0) 04:33:43 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 630.591645][ T4983] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 630.669679][ T5003] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore 04:33:43 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 630.718162][ T5003] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:33:43 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:43 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:43 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1b2b, 0x30051, r4, 0x0) 04:33:44 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 631.188620][ T5029] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 631.202434][ T5034] overlayfs: unrecognized mount option "upper" or missing value [ 631.218111][ T5029] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:44 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:44 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 631.303952][ T5029] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1c2b, 0x30051, r4, 0x0) 04:33:44 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:44 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:44 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 631.654574][ T5052] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 631.677054][ T5052] loop1: partition table partially beyond EOD, truncated 04:33:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1d2b, 0x30051, r4, 0x0) [ 631.722129][ T5052] loop1: p1 start 1 is beyond EOD, truncated [ 631.746614][ T5052] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 631.771108][ T5079] overlayfs: unrecognized mount option "upper" or missing value [ 631.808612][ T5052] loop1: p3 size 2 extends beyond EOD, truncated 04:33:44 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 631.880065][ T5087] overlayfs: failed to resolve './file0': -2 [ 631.896180][ T5052] loop1: p4 size 32768 extends beyond EOD, truncated [ 631.921410][ T5052] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 631.922569][ T5085] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 631.938841][ T5091] overlayfs: failed to resolve './file0': -2 [ 631.946489][ T5085] loop2: partition table partially beyond EOD, truncated [ 631.959982][ T5085] loop2: p1 start 1 is beyond EOD, truncated [ 631.966764][ T5085] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 631.993059][ T5085] loop2: p3 size 2 extends beyond EOD, truncated [ 632.037099][ T5052] loop1: p6 size 32768 extends beyond EOD, truncated [ 632.101555][ T5085] loop2: p4 size 32768 extends beyond EOD, truncated [ 632.234405][ T5085] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:45 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:45 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:45 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:45 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1e2b, 0x30051, r4, 0x0) [ 632.299810][ T5085] loop2: p6 size 32768 extends beyond EOD, truncated [ 632.419938][ T5124] overlayfs: failed to resolve './file0': -2 [ 632.472950][ T5131] overlayfs: failed to resolve './file0': -2 [ 632.588749][ T5133] overlayfs: unrecognized mount option "upper" or missing value 04:33:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff5f1f2b, 0x30051, r4, 0x0) 04:33:45 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:45 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:45 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:45 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 632.886338][ T5135] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 632.897974][ T5135] loop1: partition table partially beyond EOD, truncated 04:33:45 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 632.943372][ T5135] loop1: p1 start 1 is beyond EOD, truncated [ 632.968428][ T5135] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 632.979534][ T3879] Dev loop3: unable to read RDB block 1 [ 632.985510][ T3879] loop3: unable to read partition table [ 633.078526][ T3879] loop3: partition table beyond EOD, truncated [ 633.111358][ T5135] loop1: p3 size 2 extends beyond EOD, truncated 04:33:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f002b, 0x30051, r4, 0x0) [ 633.144414][ T5154] Dev loop3: unable to read RDB block 1 [ 633.156881][ T5154] loop3: unable to read partition table [ 633.170570][ T5135] loop1: p4 size 32768 extends beyond EOD, truncated [ 633.205101][ T5154] loop3: partition table beyond EOD, truncated [ 633.214490][ T5135] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 633.231485][ T5162] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 633.237432][ T5162] loop2: partition table partially beyond EOD, truncated [ 633.270118][ T5135] loop1: p6 size 32768 extends beyond EOD, truncated [ 633.291348][ T5154] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 633.320844][ T5162] loop2: p1 start 1 is beyond EOD, truncated [ 633.348023][ T5162] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 633.410804][ T5162] loop2: p3 size 2 extends beyond EOD, truncated [ 633.489838][ T5162] loop2: p4 size 32768 extends beyond EOD, truncated [ 633.543263][ T5162] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:46 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:46 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:46 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f012b, 0x30051, r4, 0x0) [ 633.605299][ T5162] loop2: p6 size 32768 extends beyond EOD, truncated [ 633.611889][ T5188] overlayfs: workdir and upperdir must be separate subtrees 04:33:46 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 633.867553][ T5192] Dev loop3: unable to read RDB block 1 [ 633.883939][ T5192] loop3: unable to read partition table [ 633.892950][ T5192] loop3: partition table beyond EOD, truncated [ 633.900845][ T5192] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:46 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:46 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f022b, 0x30051, r4, 0x0) [ 634.162184][ T5206] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 634.175312][ T5224] overlayfs: workdir and upperdir must be separate subtrees 04:33:47 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 634.209411][ T5206] loop1: partition table partially beyond EOD, truncated [ 634.283383][ T5206] loop1: p1 start 1 is beyond EOD, truncated 04:33:47 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 634.336605][ T5206] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 634.374257][ T5206] loop1: p3 size 2 extends beyond EOD, truncated [ 634.384699][ T5226] Dev loop3: unable to read RDB block 1 [ 634.402970][ T5206] loop1: p4 size 32768 extends beyond EOD, truncated [ 634.438735][ T5206] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 634.460437][ T5226] loop3: unable to read partition table [ 634.480037][ T5225] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 634.502429][ T5225] loop2: partition table partially beyond EOD, truncated [ 634.526300][ T5226] loop3: partition table beyond EOD, truncated [ 634.593086][ T5206] loop1: p6 size 32768 extends beyond EOD, truncated [ 634.623395][ T5226] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 634.634900][ T5225] loop2: p1 start 1 is beyond EOD, truncated 04:33:47 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 634.683548][ T5225] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 634.774077][ T5247] overlayfs: workdir and upperdir must be separate subtrees 04:33:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f032b, 0x30051, r4, 0x0) 04:33:47 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 634.827789][ T5225] loop2: p3 size 2 extends beyond EOD, truncated 04:33:47 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 634.947612][ T5225] loop2: p4 size 32768 extends beyond EOD, truncated 04:33:47 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 635.091684][ T5225] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 635.156179][ T5225] loop2: p6 size 32768 extends beyond EOD, truncated [ 635.177831][ T5259] Dev loop3: unable to read RDB block 1 [ 635.189763][ T5259] loop3: unable to read partition table [ 635.209101][ T5259] loop3: partition table beyond EOD, truncated [ 635.219717][ T5259] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:48 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:48 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:48 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f042b, 0x30051, r4, 0x0) 04:33:48 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 635.533840][ T5282] overlayfs: failed to resolve './fil': -2 [ 635.566019][ T5283] Dev loop3: unable to read RDB block 1 [ 635.579568][ T5283] loop3: unable to read partition table 04:33:48 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 635.608006][ T5283] loop3: partition table beyond EOD, truncated [ 635.627054][ T5283] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 635.628577][ T3879] Dev loop3: unable to read RDB block 1 [ 635.644117][ T3879] loop3: unable to read partition table [ 635.650986][ T3879] loop3: partition table beyond EOD, truncated 04:33:48 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 635.870742][ T5307] overlayfs: failed to resolve './fil': -2 04:33:48 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 635.913595][ T5298] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:48 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 636.005662][ T5298] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 636.030846][ T5312] Dev loop3: unable to read RDB block 1 [ 636.036752][ T5312] loop3: unable to read partition table [ 636.051057][ T5301] Dev loop1: unable to read RDB block 1 [ 636.058700][ T5312] loop3: partition table beyond EOD, truncated [ 636.066530][ T5301] loop1: unable to read partition table [ 636.073973][ T5312] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 636.088669][ T5301] loop1: partition table beyond EOD, truncated 04:33:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f052b, 0x30051, r4, 0x0) [ 636.152946][ T5301] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 636.169230][ T5298] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:49 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:49 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 636.344212][ T5329] overlayfs: failed to resolve './fil': -2 04:33:49 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:49 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 636.512241][ T5337] Dev loop3: unable to read RDB block 1 [ 636.550057][ T5337] loop3: unable to read partition table 04:33:49 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 636.646114][ T5337] loop3: partition table beyond EOD, truncated [ 636.676362][ T5337] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f062b, 0x30051, r4, 0x0) [ 636.722614][ T3879] Dev loop3: unable to read RDB block 1 [ 636.729417][ T3879] loop3: unable to read partition table [ 636.735385][ T3879] loop3: partition table beyond EOD, truncated [ 636.750690][ T5344] Dev loop1: unable to read RDB block 1 [ 636.771714][ T5357] overlayfs: missing 'lowerdir' [ 636.794001][ T5344] loop1: unable to read partition table 04:33:49 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 636.852303][ T5344] loop1: partition table beyond EOD, truncated [ 636.874160][ T5344] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 636.906495][ T5359] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 636.964148][ T5359] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:49 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:49 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f072b, 0x30051, r4, 0x0) [ 637.059404][ T5372] overlayfs: failed to resolve './file': -2 [ 637.145375][ T5359] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:50 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 637.286411][ T5381] overlayfs: missing 'lowerdir' [ 637.310688][ T5384] Dev loop3: unable to read RDB block 1 [ 637.326105][ T5384] loop3: unable to read partition table 04:33:50 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 637.400739][ T5384] loop3: partition table beyond EOD, truncated [ 637.499743][ T3879] Dev loop3: unable to read RDB block 1 [ 637.503835][ T5384] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 637.509428][ T3879] loop3: unable to read partition table [ 637.519730][ T3879] loop3: partition table beyond EOD, truncated [ 637.568370][ T5389] Dev loop1: unable to read RDB block 1 [ 637.599397][ T5389] loop1: unable to read partition table 04:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f082b, 0x30051, r4, 0x0) [ 637.642123][ T5389] loop1: partition table beyond EOD, truncated [ 637.678228][ T5389] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:50 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 637.688681][ T5406] overlayfs: failed to resolve './file': -2 04:33:50 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 637.812172][ T5409] overlayfs: missing 'lowerdir' 04:33:50 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:50 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:50 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f092b, 0x30051, r4, 0x0) [ 638.052720][ T5418] Dev loop3: unable to read RDB block 1 [ 638.068734][ T5418] loop3: unable to read partition table [ 638.125828][ T5418] loop3: partition table beyond EOD, truncated [ 638.140601][ T5418] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 638.157760][ T5416] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 638.194436][ T5416] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:51 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 638.309131][ T5416] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 638.336259][ T5427] Dev loop1: unable to read RDB block 1 [ 638.353727][ T5427] loop1: unable to read partition table 04:33:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0a2b, 0x30051, r4, 0x0) [ 638.399805][ T5427] loop1: partition table beyond EOD, truncated [ 638.443654][ T5427] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 638.494029][ T5449] overlayfs: failed to resolve './file': -2 [ 638.498047][ T5445] Dev loop3: unable to read RDB block 1 [ 638.506101][ T5445] loop3: unable to read partition table [ 638.513469][ T5445] loop3: partition table beyond EOD, truncated [ 638.520334][ T5445] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 638.603633][ T5454] overlayfs: unrecognized mount option "./bus" or missing value 04:33:51 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:51 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:51 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:51 executing program 2: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:51 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0b2b, 0x30051, r4, 0x0) [ 638.958071][ T5465] Dev loop3: unable to read RDB block 1 [ 638.964007][ T5465] loop3: unable to read partition table [ 639.065518][ T5465] loop3: partition table beyond EOD, truncated [ 639.085743][ T5465] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 639.110312][ T5479] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0c2b, 0x30051, r4, 0x0) [ 639.145366][ T5479] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 639.207942][ T5480] Dev loop1: unable to read RDB block 1 [ 639.213790][ T5480] loop1: unable to read partition table 04:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 639.248127][ T5494] overlayfs: unrecognized mount option "./bus" or missing value [ 639.323926][ T5480] loop1: partition table beyond EOD, truncated 04:33:52 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 639.379184][ T5479] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 639.381236][ T5480] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:52 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0d2b, 0x30051, r4, 0x0) 04:33:52 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 639.649682][ T5509] Dev loop3: unable to read RDB block 1 [ 639.655714][ T5509] loop3: unable to read partition table [ 639.657968][ T5510] overlayfs: unrecognized mount option "./bus" or missing value [ 639.707974][ T5509] loop3: partition table beyond EOD, truncated [ 639.782088][ T5509] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:52 executing program 2: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:52 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 639.829728][ T5516] Dev loop1: unable to read RDB block 1 [ 639.840311][ T5516] loop1: unable to read partition table [ 639.851754][ T5516] loop1: partition table beyond EOD, truncated [ 639.864611][ T5516] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0e2b, 0x30051, r4, 0x0) 04:33:53 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 640.102802][ T5538] overlayfs: unrecognized mount option "./bus" or missing value 04:33:53 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:53 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:53 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 640.339894][ T5544] Dev loop3: unable to read RDB block 1 [ 640.350669][ T5544] loop3: unable to read partition table [ 640.395046][ T5540] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 640.445928][ T5544] loop3: partition table beyond EOD, truncated [ 640.506170][ T5540] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f0f2b, 0x30051, r4, 0x0) [ 640.576693][ T5544] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 640.661551][ T5540] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 640.680369][ T3879] Dev loop3: unable to read RDB block 1 [ 640.685994][ T3879] loop3: unable to read partition table [ 640.692781][ T5551] Dev loop1: unable to read RDB block 1 [ 640.706095][ T5551] loop1: unable to read partition table [ 640.726579][ T3879] loop3: partition table beyond EOD, truncated [ 640.733726][ T5551] loop1: partition table beyond EOD, truncated [ 640.793228][ T5551] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:53 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f102b, 0x30051, r4, 0x0) 04:33:53 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:53 executing program 2: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:54 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 641.120454][ T5577] Dev loop3: unable to read RDB block 1 [ 641.127554][ T5577] loop3: unable to read partition table [ 641.133767][ T5577] loop3: partition table beyond EOD, truncated [ 641.179858][ T5583] overlayfs: unrecognized mount option "./bus" or missing value [ 641.236879][ T5577] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:54 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:54 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 641.401210][ T5586] Dev loop1: unable to read RDB block 1 [ 641.429328][ T5586] loop1: unable to read partition table 04:33:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f112b, 0x30051, r4, 0x0) [ 641.480930][ T5603] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 641.487907][ T5586] loop1: partition table beyond EOD, truncated [ 641.510657][ T5603] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 641.558699][ T5603] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 641.574248][ T5586] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:54 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:54 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:54 executing program 2: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 641.878610][ T3879] Dev loop3: unable to read RDB block 1 [ 641.899676][ T5629] overlayfs: unrecognized mount option "./bus" or missing value [ 641.913255][ T3879] loop3: unable to read partition table [ 641.950106][ T3879] loop3: partition table beyond EOD, truncated 04:33:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f122b, 0x30051, r4, 0x0) [ 642.012135][ T5619] Dev loop3: unable to read RDB block 1 [ 642.035869][ T5619] loop3: unable to read partition table 04:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 642.079337][ T5619] loop3: partition table beyond EOD, truncated [ 642.088664][ T5619] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 642.168353][ T5641] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 642.209633][ T5641] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 642.338625][ T5643] Dev loop1: unable to read RDB block 1 [ 642.345101][ T5643] loop1: unable to read partition table [ 642.360778][ T5641] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 642.397719][ T5643] loop1: partition table beyond EOD, truncated 04:33:55 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 642.439746][ T5643] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 642.447374][ T5663] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore 04:33:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f132b, 0x30051, r4, 0x0) [ 642.549951][ T5663] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:33:55 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:55 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:55 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 642.748794][ T5671] Dev loop3: unable to read RDB block 1 [ 642.754860][ T5671] loop3: unable to read partition table [ 642.819048][ T5671] loop3: partition table beyond EOD, truncated [ 642.828654][ T5671] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:55 executing program 2: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 642.890391][ T3879] Dev loop3: unable to read RDB block 1 [ 642.896635][ T3879] loop3: unable to read partition table [ 642.902604][ T3879] loop3: partition table beyond EOD, truncated [ 642.921776][ T5677] Dev loop1: unable to read RDB block 1 [ 642.977894][ T5677] loop1: unable to read partition table 04:33:55 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f142b, 0x30051, r4, 0x0) [ 643.025204][ T5677] loop1: partition table beyond EOD, truncated [ 643.051591][ T5677] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 643.239065][ T5698] Dev loop3: unable to read RDB block 1 [ 643.253880][ T5698] loop3: unable to read partition table 04:33:56 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 643.294372][ T5698] loop3: partition table beyond EOD, truncated [ 643.321992][ T5700] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 643.331218][ T5709] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore [ 643.391101][ T5698] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:56 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 643.439475][ T5700] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 643.446224][ T5709] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 643.461103][ T5714] Dev loop1: unable to read RDB block 1 [ 643.467867][ T5714] loop1: unable to read partition table [ 643.481212][ T5714] loop1: partition table beyond EOD, truncated 04:33:56 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) [ 643.555686][ T5714] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f152b, 0x30051, r4, 0x0) 04:33:56 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 643.626032][ T5700] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:56 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 643.906237][ T5737] overlayfs: option "workdir=./" is useless in a non-upper mount, ignore [ 643.955223][ T5737] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 643.968078][ T5745] overlayfs: missing 'lowerdir' [ 643.976505][ T5739] Dev loop3: unable to read RDB block 1 [ 643.982423][ T5739] loop3: unable to read partition table [ 643.992887][ T5739] loop3: partition table beyond EOD, truncated [ 644.000150][ T5739] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f162b, 0x30051, r4, 0x0) 04:33:57 executing program 2: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:57 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) 04:33:57 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 644.290905][ T5747] Dev loop1: unable to read RDB block 1 [ 644.307878][ T5747] loop1: unable to read partition table [ 644.343189][ T5747] loop1: partition table beyond EOD, truncated [ 644.383044][ T5747] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 644.490927][ T5764] Dev loop3: unable to read RDB block 1 [ 644.501582][ T5764] loop3: unable to read partition table [ 644.513141][ T5767] overlayfs: unrecognized mount option "upper" or missing value [ 644.521527][ T5764] loop3: partition table beyond EOD, truncated [ 644.551264][ T5764] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 644.657147][ T5779] overlayfs: missing 'lowerdir' [ 644.672401][ T5766] loop2: p1 < > p2 p3 < p5 p6 > p4 04:33:57 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:57 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 644.739646][ T5766] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:57 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f172b, 0x30051, r4, 0x0) [ 644.805450][ T5766] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:33:57 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) [ 645.148311][ T5792] Dev loop3: unable to read RDB block 1 [ 645.154914][ T5792] loop3: unable to read partition table [ 645.177528][ T5792] loop3: partition table beyond EOD, truncated [ 645.185517][ T5790] Dev loop1: unable to read RDB block 1 [ 645.213772][ T5792] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 645.234216][ T5790] loop1: unable to read partition table 04:33:58 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 645.271117][ T5810] overlayfs: missing 'lowerdir' [ 645.295850][ T5790] loop1: partition table beyond EOD, truncated 04:33:58 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 04:33:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f182b, 0x30051, r4, 0x0) [ 645.334073][ T5814] overlayfs: unrecognized mount option "upper" or missing value [ 645.337868][ T5790] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:58 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:58 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upper']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:58 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 645.662172][ T5818] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 645.707283][ T5818] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 645.750928][ T5826] Dev loop3: unable to read RDB block 1 [ 645.769470][ T5826] loop3: unable to read partition table [ 645.786259][ T5818] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 645.792864][ T5842] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 645.865793][ T5826] loop3: partition table beyond EOD, truncated 04:33:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f192b, 0x30051, r4, 0x0) [ 645.956212][ T5826] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 645.956839][ T3879] Dev loop3: unable to read RDB block 1 [ 645.971913][ T3879] loop3: unable to read partition table [ 645.977772][ T3879] loop3: partition table beyond EOD, truncated 04:33:58 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 646.013086][ T5848] overlayfs: unrecognized mount option "upper" or missing value 04:33:58 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 04:33:59 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:59 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:59 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 646.298469][ T5861] overlayfs: failed to resolve './fil': -2 [ 646.350975][ T5863] Dev loop3: unable to read RDB block 1 [ 646.393933][ T5863] loop3: unable to read partition table [ 646.408402][ T5874] overlayfs: workdir and upperdir must be separate subtrees 04:33:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1a2b, 0x30051, r4, 0x0) [ 646.467829][ T5863] loop3: partition table beyond EOD, truncated [ 646.507121][ T5863] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:33:59 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:33:59 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 646.519250][ T3879] Dev loop3: unable to read RDB block 1 [ 646.534760][ T3879] loop3: unable to read partition table [ 646.554324][ T5879] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 646.588044][ T5872] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 646.611776][ T3879] loop3: partition table beyond EOD, truncated [ 646.663100][ T5872] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:33:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1b2b, 0x30051, r4, 0x0) 04:33:59 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:33:59 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) [ 646.793907][ T5872] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 646.880518][ T5893] overlayfs: workdir and upperdir must be separate subtrees [ 646.953249][ T5892] Dev loop1: unable to read RDB block 1 [ 646.960998][ T5892] loop1: unable to read partition table [ 646.971516][ T5892] loop1: partition table beyond EOD, truncated [ 646.986791][ T5892] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 647.109543][ T5903] Dev loop3: unable to read RDB block 1 [ 647.118312][ T5903] loop3: unable to read partition table [ 647.133444][ T5903] loop3: partition table beyond EOD, truncated [ 647.142640][ T3879] Dev loop3: unable to read RDB block 1 [ 647.149835][ T5903] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:34:00 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 647.159208][ T3879] loop3: unable to read partition table [ 647.164967][ T3879] loop3: partition table beyond EOD, truncated 04:34:00 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:00 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:00 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1c2b, 0x30051, r4, 0x0) [ 647.372449][ T5915] overlayfs: workdir and upperdir must be separate subtrees [ 647.466359][ T5932] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 04:34:00 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) [ 647.509318][ T5919] Dev loop3: unable to read RDB block 1 [ 647.515435][ T5919] loop3: unable to read partition table 04:34:00 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 647.579177][ T5919] loop3: partition table beyond EOD, truncated [ 647.597344][ T5920] Dev loop1: unable to read RDB block 1 [ 647.603690][ T5920] loop1: unable to read partition table [ 647.613053][ T5919] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 647.658182][ T5920] loop1: partition table beyond EOD, truncated [ 647.667374][ T3879] Dev loop3: unable to read RDB block 1 [ 647.694535][ T5920] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 647.710462][ T3879] loop3: unable to read partition table [ 647.717946][ T3879] loop3: partition table beyond EOD, truncated [ 647.734200][ T5940] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 647.764463][ T5940] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:00 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1d2b, 0x30051, r4, 0x0) [ 647.876807][ T5953] overlayfs: failed to resolve './fil': -2 [ 647.887171][ T5940] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:00 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:00 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 648.068132][ T5964] overlayfs: missing 'lowerdir' 04:34:01 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) 04:34:01 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 648.273498][ T5972] overlayfs: failed to resolve './fil': -2 04:34:01 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:01 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./fil']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 648.441556][ T5971] Dev loop1: unable to read RDB block 1 [ 648.477476][ T5971] loop1: unable to read partition table 04:34:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1e2b, 0x30051, r4, 0x0) [ 648.550413][ T5971] loop1: partition table beyond EOD, truncated [ 648.587861][ T5971] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:01 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 648.670001][ T5993] overlayfs: missing 'lowerdir' 04:34:01 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) 04:34:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff6f1f2b, 0x30051, r4, 0x0) [ 648.847418][ T6004] overlayfs: failed to resolve './fil': -2 04:34:01 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 648.912383][ T5997] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 648.938714][ T5997] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 648.968442][ T5997] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:02 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:34:02 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 649.224037][ T6022] Dev loop1: unable to read RDB block 1 [ 649.233332][ T6022] loop1: unable to read partition table [ 649.253455][ T6022] loop1: partition table beyond EOD, truncated [ 649.265974][ T6022] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f002b, 0x30051, r4, 0x0) 04:34:02 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:02 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 649.572501][ T6035] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 649.583863][ T6049] overlayfs: missing 'lowerdir' [ 649.604157][ T6035] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 649.617120][ T6047] overlayfs: failed to resolve './file': -2 04:34:02 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 649.780746][ T6054] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:02 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 649.808478][ T6035] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 649.834927][ T6054] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 649.902766][ T6054] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f012b, 0x30051, r4, 0x0) [ 649.981248][ T6061] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 650.054964][ T6061] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 650.146986][ T6061] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:03 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 650.213842][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 650.287783][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 650.342142][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f022b, 0x30051, r4, 0x0) 04:34:03 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:03 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 650.693009][ T6125] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 650.721676][ T6125] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 650.874819][ T6125] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 650.891497][ T6135] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 650.926073][ T6135] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 650.960548][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f032b, 0x30051, r4, 0x0) [ 651.045069][ T6135] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 651.047629][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 651.089981][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 651.109696][ T6151] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:04 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 651.169492][ T6151] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 651.315199][ T6151] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f042b, 0x30051, r4, 0x0) [ 651.568464][ T6194] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 651.633766][ T6194] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:04 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855c", 0x10) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 651.715761][ T6107] overlayfs: failed to resolve './file': -2 [ 651.722025][ T6105] overlayfs: missing 'workdir' 04:34:04 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 651.842902][ T6194] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:04 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:04 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f052b, 0x30051, r4, 0x0) [ 651.962284][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 651.982346][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 651.998886][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:04 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 652.200206][ T6242] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 652.277238][ T6242] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 652.310285][ T6243] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 652.368684][ T6256] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 652.400240][ T6243] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 652.402063][ T6242] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 652.422206][ T6267] overlayfs: failed to resolve './file': -2 [ 652.427793][ T6277] overlayfs: failed to resolve './file0': -2 [ 652.436569][ T6256] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 652.467078][ T6265] overlayfs: missing 'workdir' 04:34:05 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f062b, 0x30051, r4, 0x0) [ 652.699093][ T6256] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 652.725347][ T6243] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:05 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 652.905554][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:05 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855c", 0x10) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 652.945015][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 653.003221][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 653.111122][ T6315] overlayfs: missing 'workdir' 04:34:06 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:06 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:06 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 653.470004][ T6326] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:06 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f072b, 0x30051, r4, 0x0) [ 653.549737][ T6326] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 653.614448][ T6339] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 653.671747][ T6355] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 653.704095][ T6339] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 653.707687][ T6355] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 653.746210][ T6346] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 653.774253][ T6326] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 653.777265][ T6346] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:06 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 653.863810][ T6339] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 654.012055][ T6346] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:07 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 654.171011][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f082b, 0x30051, r4, 0x0) 04:34:07 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855c", 0x10) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 654.237986][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 654.302129][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 654.414997][ T6405] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 654.492135][ T6405] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:34:07 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:07 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:34:07 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:07 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 654.678976][ T6410] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f092b, 0x30051, r4, 0x0) [ 654.731665][ T6410] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 654.853960][ T6410] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0a2b, 0x30051, r4, 0x0) [ 655.040104][ T6441] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 655.079244][ T6441] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 655.100736][ T6444] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 655.142335][ T6444] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 655.231825][ T6444] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 655.237644][ T6441] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:08 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e3", 0x18) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 655.446466][ T6482] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 655.462532][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:08 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 655.518251][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 655.543554][ T6482] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 655.602918][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0b2b, 0x30051, r4, 0x0) 04:34:08 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:08 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 655.876480][ T6501] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:08 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 655.974830][ T6501] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:08 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 656.138354][ T6501] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 656.226661][ T6537] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0c2b, 0x30051, r4, 0x0) [ 656.261478][ T6537] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 656.294237][ T6536] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 656.410383][ T6536] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:09 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e3", 0x18) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 656.480607][ T6537] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 656.555968][ T6551] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 656.560742][ T6574] overlayfs: failed to resolve './file1': -2 [ 656.610571][ T6536] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 656.620121][ T6551] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 656.672855][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 656.758143][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:09 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) [ 656.831094][ T6551] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 656.878698][ T6576] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 656.889841][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 656.923887][ T6576] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:09 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 656.983285][ T6576] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0d2b, 0x30051, r4, 0x0) 04:34:10 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:10 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 657.209648][ T6633] overlayfs: missing 'lowerdir' 04:34:10 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) 04:34:10 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e3", 0x18) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 657.528713][ T6637] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0e2b, 0x30051, r4, 0x0) [ 657.609615][ T6637] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 657.658719][ T6644] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 657.681630][ T6644] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 657.778834][ T6664] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 657.792879][ T6644] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 657.802320][ T6637] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 657.827114][ T6668] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 657.831443][ T6664] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f0f2b, 0x30051, r4, 0x0) [ 657.880778][ T6668] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 657.934536][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 657.998744][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 658.021295][ T6664] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 658.033899][ T6668] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 658.060531][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:11 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:11 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 658.495699][ T6740] overlayfs: missing 'lowerdir' 04:34:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f102b, 0x30051, r4, 0x0) 04:34:11 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:11 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:34:11 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) [ 658.669169][ T6743] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 658.726816][ T6743] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 658.904464][ T6743] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 658.943361][ T6759] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 659.023513][ T6759] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 659.089733][ T6778] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f112b, 0x30051, r4, 0x0) [ 659.163193][ T6778] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 659.188436][ T6759] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 659.188664][ T6779] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 659.213504][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 659.237433][ T6795] overlayfs: missing 'lowerdir' [ 659.311014][ T6779] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 659.311602][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 659.357186][ T6778] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:12 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) [ 659.444914][ T6779] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 659.451737][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:12 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:12 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e3", 0x18) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f122b, 0x30051, r4, 0x0) 04:34:12 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:12 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 660.067048][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 660.080592][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 660.162385][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 660.217625][ T6893] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 660.232735][ T6905] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 660.330179][ T6892] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 660.343290][ T6893] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f132b, 0x30051, r4, 0x0) [ 660.373582][ T6853] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 660.388580][ T6874] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 660.396329][ T6892] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 660.416127][ T6874] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:13 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) [ 660.499605][ T6892] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 660.512016][ T6853] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 660.522697][ T6874] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 660.538038][ T6893] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 660.660007][ T6853] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:13 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:13 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aa", 0x1c) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:13 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e3", 0x18) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f142b, 0x30051, r4, 0x0) 04:34:14 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f152b, 0x30051, r4, 0x0) [ 661.356906][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 661.363578][ T6995] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 661.379619][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 661.462574][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 661.530024][ T6996] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:14 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) [ 661.572335][ T6996] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 661.656831][ T7004] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 661.768653][ T6956] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 661.783198][ T6996] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 661.792224][ T7004] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 661.807792][ T6999] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f162b, 0x30051, r4, 0x0) [ 661.832913][ T6956] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 661.864309][ T6999] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 661.936745][ T6956] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 661.980365][ T7004] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 661.997395][ T6999] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 662.047874][ T7057] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 04:34:15 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:15 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:15 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) 04:34:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f172b, 0x30051, r4, 0x0) 04:34:15 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:15 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 662.538892][ T7076] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 662.622645][ T7076] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 662.817867][ T7115] overlayfs: missing 'lowerdir' [ 662.833837][ T7095] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 662.932628][ T7076] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 663.025001][ T7095] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 663.038383][ T7109] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f182b, 0x30051, r4, 0x0) [ 663.152804][ T7109] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 663.162846][ T7123] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 663.173408][ T7095] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 663.219165][ T7123] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 663.288938][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f192b, 0x30051, r4, 0x0) 04:34:16 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 663.349853][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 663.372445][ T7123] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 663.387835][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:16 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) 04:34:16 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 663.445828][ T7109] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:16 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1a2b, 0x30051, r4, 0x0) 04:34:16 executing program 4: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 663.879144][ T7190] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 663.945563][ T7190] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 663.994103][ T7190] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 664.105844][ T7192] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:17 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 664.218547][ T7192] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 664.280892][ T7239] overlayfs: missing 'lowerdir' 04:34:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1b2b, 0x30051, r4, 0x0) 04:34:17 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@index_off='index=off'}]}) 04:34:17 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) read$FUSE(r0, &(0x7f0000000440), 0x1000) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="776f726b6469723d2e2f66696c65302c6c6f7765726469723d2e2f6275732c75707065726469723d81006275732c00"]) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:34:17 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 664.435208][ T7192] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:17 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 664.730002][ T7258] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 664.738603][ T7258] loop1: partition table partially beyond EOD, truncated [ 664.836088][ T7258] loop1: p1 start 1 is beyond EOD, truncated [ 664.842401][ T7258] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 664.855635][ T7268] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 664.922392][ T7268] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 664.941469][ T7258] loop1: p3 size 2 extends beyond EOD, truncated [ 664.955778][ T7285] overlayfs: missing 'lowerdir' 04:34:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1c2b, 0x30051, r4, 0x0) 04:34:18 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 665.029676][ T7258] loop1: p4 size 32768 extends beyond EOD, truncated [ 665.063767][ T7268] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 665.120796][ T7258] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 665.151968][ T7263] overlayfs: failed to resolve '': -2 [ 665.171223][ T7289] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 665.192561][ T7263] overlayfs: filesystem on './file0' not supported as upperdir [ 665.198955][ T7289] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 665.259495][ T7258] loop1: p6 size 32768 extends beyond EOD, truncated 04:34:18 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 665.426365][ T7289] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:18 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:18 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1d2b, 0x30051, r4, 0x0) [ 665.845317][ T7346] overlayfs: missing 'workdir' 04:34:18 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 665.958980][ T7337] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1e2b, 0x30051, r4, 0x0) 04:34:18 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 666.027378][ T7332] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 666.032817][ T7332] loop1: partition table partially beyond EOD, truncated [ 666.064792][ T7337] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 666.119391][ T7332] loop1: p1 start 1 is beyond EOD, truncated [ 666.157825][ T7352] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 666.188442][ T7370] overlayfs: missing 'workdir' [ 666.196903][ T7332] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 666.208789][ T7337] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 666.224568][ T7352] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff7f1f2b, 0x30051, r4, 0x0) [ 666.332750][ T7332] loop1: p3 size 2 extends beyond EOD, truncated 04:34:19 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 666.381804][ T7352] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 666.434897][ T7332] loop1: p4 size 32768 extends beyond EOD, truncated [ 666.480330][ T7375] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 666.529525][ T7375] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 666.555734][ T7332] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 666.582894][ T7375] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 666.642701][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:19 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 666.674962][ T7332] loop1: p6 size 32768 extends beyond EOD, truncated [ 666.702668][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:19 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 666.802882][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:19 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f002b, 0x30051, r4, 0x0) 04:34:20 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 667.176777][ T7430] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 667.202935][ T7430] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 667.226729][ T7465] overlayfs: missing 'workdir' [ 667.269879][ T7430] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f012b, 0x30051, r4, 0x0) 04:34:20 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 667.509426][ T7454] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 667.527953][ T7454] loop1: partition table partially beyond EOD, truncated [ 667.594370][ T7454] loop1: p1 start 1 is beyond EOD, truncated [ 667.600629][ T7454] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 667.650159][ T7472] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f022b, 0x30051, r4, 0x0) [ 667.672811][ T7472] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 667.725583][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 667.734338][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 667.780205][ T7454] loop1: p3 size 2 extends beyond EOD, truncated 04:34:20 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 667.841694][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 667.869866][ T7454] loop1: p4 size 32768 extends beyond EOD, truncated [ 667.879570][ T7472] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 667.975032][ T7454] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 667.985310][ T7476] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 668.026541][ T7454] loop1: p6 size 32768 extends beyond EOD, truncated 04:34:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f032b, 0x30051, r4, 0x0) [ 668.068718][ T7476] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:21 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 668.175775][ T7476] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:21 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21f", 0x1e) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 668.264711][ T7537] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 668.273663][ T7537] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 04:34:21 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 668.387852][ T7539] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 668.412242][ T7539] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 668.470430][ T7539] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:21 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 668.717347][ T7556] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 668.745240][ T7556] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f042b, 0x30051, r4, 0x0) [ 668.813067][ T7556] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 668.961331][ T7582] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:22 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 669.155934][ T7582] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f052b, 0x30051, r4, 0x0) [ 669.256380][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 669.322790][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 669.377629][ T7582] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 669.401195][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:22 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 669.466424][ T7638] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore 04:34:22 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 669.532371][ T7638] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 669.556527][ T7592] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f062b, 0x30051, r4, 0x0) [ 669.607506][ T7592] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:22 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 669.719041][ T7592] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 669.746441][ T7649] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 669.770448][ T7649] loop2: partition table partially beyond EOD, truncated [ 669.823383][ T7649] loop2: p1 start 1 is beyond EOD, truncated 04:34:22 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 669.913895][ T7649] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 670.021507][ T7649] loop2: p3 size 2 extends beyond EOD, truncated [ 670.059970][ T7669] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 670.060303][ T7649] loop2: p4 size 32768 extends beyond EOD, truncated [ 670.111436][ T7667] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 670.113434][ T7669] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 670.146258][ T7649] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 670.148918][ T7667] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f072b, 0x30051, r4, 0x0) [ 670.247360][ T7667] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 670.251303][ T7649] loop2: p6 size 32768 extends beyond EOD, truncated [ 670.308686][ T7669] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 670.403108][ T7709] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore 04:34:23 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 670.446025][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 670.507927][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 670.520300][ T7709] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 670.571947][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 670.600188][ T7705] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:23 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 670.679309][ T7705] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f082b, 0x30051, r4, 0x0) [ 670.791515][ T7705] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:23 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 670.909332][ T7742] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 670.918776][ T7742] loop2: partition table partially beyond EOD, truncated [ 670.933204][ T7742] loop2: p1 start 1 is beyond EOD, truncated [ 670.944757][ T7742] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:23 executing program 5: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 670.978689][ T7742] loop2: p3 size 2 extends beyond EOD, truncated [ 671.010973][ T7742] loop2: p4 size 32768 extends beyond EOD, truncated 04:34:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f092b, 0x30051, r4, 0x0) [ 671.089915][ T7742] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 671.149336][ T7763] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 671.231695][ T7742] loop2: p6 size 32768 extends beyond EOD, truncated [ 671.258673][ T7763] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0a2b, 0x30051, r4, 0x0) 04:34:24 executing program 4: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 671.440247][ T7780] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 671.475009][ T7763] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 671.539694][ T7780] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 671.568740][ T7791] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 671.585209][ T7780] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:34:24 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0b2b, 0x30051, r4, 0x0) [ 671.678674][ T7791] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 671.752300][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 671.782133][ T7791] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 671.809162][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 671.873441][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:24 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0c2b, 0x30051, r4, 0x0) 04:34:25 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 672.138336][ T7849] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 672.196530][ T7849] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:25 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 672.322975][ T7849] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 672.345012][ T7857] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 672.350448][ T7857] loop2: partition table partially beyond EOD, truncated 04:34:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0d2b, 0x30051, r4, 0x0) [ 672.437290][ T7857] loop2: p1 start 1 is beyond EOD, truncated [ 672.465406][ T7857] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 672.575640][ T7888] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 672.597874][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 672.606669][ T7857] loop2: p3 size 2 extends beyond EOD, truncated [ 672.626974][ T7857] loop2: p4 size 32768 extends beyond EOD, truncated [ 672.647443][ T7857] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 672.669697][ T7888] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 672.682081][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 672.696380][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 672.718622][ T7857] loop2: p6 size 32768 extends beyond EOD, truncated [ 672.745535][ T7888] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0e2b, 0x30051, r4, 0x0) [ 672.808246][ T7894] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 672.821312][ T7894] loop5: partition table partially beyond EOD, truncated 04:34:25 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 672.903092][ T7894] loop5: p1 start 1 is beyond EOD, truncated 04:34:25 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 672.966907][ T7894] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 673.048423][ T7894] loop5: p3 size 2 extends beyond EOD, truncated [ 673.081908][ T7894] loop5: p4 size 32768 extends beyond EOD, truncated [ 673.136496][ T7894] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 673.142166][ T7926] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:26 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 673.185261][ T7926] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 673.185953][ T7894] loop5: p6 size 32768 extends beyond EOD, truncated 04:34:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f0f2b, 0x30051, r4, 0x0) 04:34:26 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b9"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 673.393649][ T7926] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 673.517567][ T7973] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 673.542878][ T7973] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 673.565804][ T7967] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 673.582938][ T7973] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 673.635177][ T7967] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:26 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 673.908950][ T7967] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 673.977410][ T8014] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f102b, 0x30051, r4, 0x0) [ 674.045467][ T8014] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:34:27 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 674.158483][ T8013] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 674.179212][ T8013] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 674.230379][ T8014] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:34:27 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f112b, 0x30051, r4, 0x0) [ 674.320977][ T8013] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 674.527404][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 674.582181][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 674.627743][ T8066] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 674.701721][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 674.714828][ T8066] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 674.727415][ T8083] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 674.763195][ T8066] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 674.780534][ T8065] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 674.828105][ T8083] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 674.862757][ T8065] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:27 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b9"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:27 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f122b, 0x30051, r4, 0x0) [ 675.152446][ T8083] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 675.163149][ T8065] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:28 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 675.237699][ T8119] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 675.280629][ T8119] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:28 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b9"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 675.527691][ T8119] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f132b, 0x30051, r4, 0x0) [ 675.587148][ T8155] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:28 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 675.629726][ T8149] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 675.700803][ T8155] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 675.723683][ T8149] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 675.796933][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 675.843552][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 675.848081][ T8155] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 675.868471][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 675.891048][ T8170] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:28 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 675.948856][ T8149] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 675.966248][ T8170] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f142b, 0x30051, r4, 0x0) [ 676.170149][ T8170] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:29 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:29 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 676.350092][ T8229] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 676.411392][ T8229] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 676.428259][ T8238] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 676.477713][ T8238] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0x2b06efff, 0x30051, r4, 0x0) [ 676.545925][ T8238] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 676.566186][ T8229] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f152b, 0x30051, r4, 0x0) [ 676.710594][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 676.756767][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 676.774843][ T8279] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 676.785730][ T8279] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 676.841478][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 676.901021][ T8279] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:29 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:30 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f162b, 0x30051, r4, 0x0) 04:34:30 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 677.215732][ T8300] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:30 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 677.274102][ T8300] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 677.344716][ T8343] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 677.398382][ T8343] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 677.442109][ T8300] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 677.516477][ T8363] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 677.591231][ T8363] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f172b, 0x30051, r4, 0x0) [ 677.655093][ T8343] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 677.665276][ T8376] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 677.684621][ T8376] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 677.801409][ T8363] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 677.817718][ T8376] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:30 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 677.860204][ T8361] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 677.952821][ T8361] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 677.982762][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 678.045499][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 678.074803][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:31 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 678.145542][ T8361] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:31 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:31 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) 04:34:31 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f182b, 0x30051, r4, 0x0) [ 678.457849][ T8443] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 678.540127][ T8443] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 678.570586][ T8458] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f192b, 0x30051, r4, 0x0) [ 678.604461][ T8469] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 678.620125][ T8469] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 678.681243][ T8458] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 678.715263][ T8443] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 678.726156][ T8469] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 678.737685][ T8472] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 678.743986][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 678.751197][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 678.781876][ T8472] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 678.821176][ T8458] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1a2b, 0x30051, r4, 0x0) [ 678.836867][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 679.016286][ T8472] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 679.063865][ T8471] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 679.106065][ T8471] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 679.232318][ T8471] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:32 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:32 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:32 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) 04:34:32 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1b2b, 0x30051, r4, 0x0) 04:34:32 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1c2b, 0x30051, r4, 0x0) [ 679.674446][ T8572] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 679.687758][ T8572] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 679.783053][ T8572] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 679.791680][ T8596] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 679.835230][ T8596] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 679.890578][ T8611] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 679.935065][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 679.944573][ T8611] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 679.950354][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 679.998562][ T8596] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 680.076098][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:33 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 680.175850][ T8611] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 680.233301][ T8622] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1d2b, 0x30051, r4, 0x0) [ 680.324213][ T8597] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 680.360868][ T8622] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 680.387321][ T8597] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 680.457882][ T8622] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 680.473848][ T8597] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:33 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) 04:34:33 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 680.716809][ T8683] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 680.766606][ T8683] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1e2b, 0x30051, r4, 0x0) [ 680.817921][ T8683] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:33 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:33 executing program 1: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff8f1f2b, 0x30051, r4, 0x0) 04:34:34 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 681.102309][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 681.153964][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 681.178708][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 681.187894][ T8708] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 681.259142][ T8708] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f002b, 0x30051, r4, 0x0) [ 681.413910][ T8778] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 681.427585][ T8778] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 681.451729][ T8708] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 681.533690][ T8762] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 681.549969][ T8778] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:34 executing program 5: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x14040000) [ 681.620240][ T8762] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 681.654690][ T8779] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 681.687841][ T8779] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 681.725049][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 681.742982][ T8779] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 681.792338][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 681.864397][ T8762] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 681.888959][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f012b, 0x30051, r4, 0x0) 04:34:34 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 682.070861][ T8827] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:35 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) [ 682.152957][ T8827] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:34:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f022b, 0x30051, r4, 0x0) [ 682.259712][ T8827] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:34:35 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b9"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:35 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="776f726b6469723d2e2f66696c65302c6c6f7765726469723d2e2f6275732c75707065726469723d81006275732c00"]) mount$overlay(0xfeffffff00000000, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 682.393567][ T8870] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 682.417378][ T8870] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 682.484295][ T8870] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:35 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 682.698551][ T8876] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 682.747017][ T8876] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 682.890131][ T8876] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 682.936381][ T8919] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 683.046299][ T8919] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:34:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f032b, 0x30051, r4, 0x0) 04:34:36 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 683.149278][ T8910] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 683.151904][ T8928] overlayfs: failed to resolve '': -2 [ 683.190379][ T8910] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 683.223180][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 683.249677][ T8919] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 683.264685][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:36 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 683.297699][ T8910] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 683.326042][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 683.546338][ T8968] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:36 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) [ 683.625798][ T8968] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 683.664339][ T8968] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f042b, 0x30051, r4, 0x0) 04:34:36 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:36 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:36 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 683.937119][ T8989] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 683.998123][ T8989] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 684.055886][ T9000] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f052b, 0x30051, r4, 0x0) [ 684.108143][ T9000] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 684.142073][ T8989] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 684.163230][ T9022] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 684.174821][ T9022] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 684.288791][ T9024] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 684.332986][ T9022] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 684.343951][ T9000] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f062b, 0x30051, r4, 0x0) [ 684.401342][ T9024] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 684.465770][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 684.488978][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 684.540773][ T9050] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 684.598273][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 684.631053][ T9024] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 684.690656][ T9050] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:37 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f072b, 0x30051, r4, 0x0) 04:34:37 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 684.839840][ T9050] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:37 executing program 3: write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x0) 04:34:37 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 685.246836][ T9131] loop2: p1 < > p2 p3 < p5 p6 > p4 04:34:38 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 685.310511][ T9131] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 685.326278][ T9135] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f082b, 0x30051, r4, 0x0) [ 685.358252][ T9135] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 685.387782][ T9148] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 685.451710][ T9148] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 685.485714][ T9131] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 685.531130][ T9135] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 685.620959][ T9160] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 685.642213][ T9148] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 685.756919][ T9160] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f092b, 0x30051, r4, 0x0) [ 685.866837][ T9185] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 685.890602][ T9185] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0a2b, 0x30051, r4, 0x0) [ 686.007597][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:38 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 686.029709][ T9185] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 686.048321][ T9160] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 686.055254][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 686.148162][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:39 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:39 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 686.393611][ T9251] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 686.404072][ T9251] loop2: p2 size 1073741824 extends beyond EOD, truncated 04:34:39 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:39 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 686.580986][ T9251] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0b2b, 0x30051, r4, 0x0) [ 686.747136][ T9282] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 686.794518][ T9282] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 686.846414][ T9282] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 686.925907][ T9294] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 686.926163][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 687.000668][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 687.015971][ T9294] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 687.030922][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:39 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1d"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 687.080493][ T9300] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:40 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 687.180592][ T9300] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 687.191595][ T9294] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0c2b, 0x30051, r4, 0x0) 04:34:40 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 687.312431][ T9300] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 687.707974][ T9355] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:40 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 687.757420][ T9355] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:40 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:40 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 687.862397][ T9371] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 687.876500][ T9371] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 687.935698][ T9355] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 687.962482][ T9371] loop2: p5 size 1073741824 extends beyond EOD, truncated 04:34:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0d2b, 0x30051, r4, 0x0) [ 688.077316][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 688.136048][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 688.213232][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 688.264283][ T9381] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 688.285698][ T9381] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:41 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 688.356162][ T9381] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 688.474474][ T9426] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 688.494185][ T9426] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:41 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1d"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:41 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 688.762827][ T9426] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0e2b, 0x30051, r4, 0x0) 04:34:41 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1d"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:41 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 689.176755][ T9482] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 689.250015][ T9482] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:42 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f0f2b, 0x30051, r4, 0x0) [ 689.394387][ T9482] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 689.406222][ T9484] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 689.455119][ T9484] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 689.543073][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 689.570249][ T9484] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:34:42 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 689.588760][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 689.614292][ T9492] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 689.624347][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 689.676487][ T9492] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 689.869331][ T9492] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f102b, 0x30051, r4, 0x0) 04:34:42 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1d"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 690.005984][ T9546] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:43 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:43 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 690.084955][ T9546] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:43 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 690.222140][ T9546] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f112b, 0x30051, r4, 0x0) [ 690.365657][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:43 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 690.424775][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 690.448562][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f122b, 0x30051, r4, 0x0) [ 690.503295][ T9584] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 690.551411][ T9584] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:43 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:43 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 690.704342][ T9584] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:43 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:43 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f132b, 0x30051, r4, 0x0) 04:34:44 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 691.160065][ T9666] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 691.196653][ T9664] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f142b, 0x30051, r4, 0x0) [ 691.245232][ T9666] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 691.275095][ T9664] loop5: p2 size 1073741824 extends beyond EOD, truncated 04:34:44 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 691.438024][ T9666] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 691.467963][ T9664] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 691.488022][ T9681] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 691.529897][ T9681] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 691.575035][ T9695] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 691.670088][ T9695] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f152b, 0x30051, r4, 0x0) [ 691.839271][ T9681] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 691.860524][ T9725] Dev loop2: unable to read RDB block 1 [ 691.942597][ T9725] loop2: unable to read partition table [ 691.974956][ T9695] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 692.014821][ T9725] loop2: partition table beyond EOD, truncated 04:34:45 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 692.083993][ T9725] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 692.124055][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:45 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f162b, 0x30051, r4, 0x0) [ 692.170237][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:45 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919cae"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 692.244614][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:45 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:45 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 692.488347][ T9777] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 692.540700][ T9777] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 692.612899][ T9777] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 692.621651][ T9787] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f172b, 0x30051, r4, 0x0) [ 692.654951][ T9803] Dev loop2: unable to read RDB block 1 [ 692.663496][ T9803] loop2: unable to read partition table [ 692.674753][ T9787] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 692.685870][ T9803] loop2: partition table beyond EOD, truncated [ 692.699198][ T9803] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 692.726200][ T9787] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 692.846076][ T9820] Dev loop3: unable to read RDB block 1 [ 692.875689][ T9820] loop3: unable to read partition table 04:34:45 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 692.952627][ T9820] loop3: partition table beyond EOD, truncated [ 692.969628][ T9810] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 693.043895][ T9820] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 693.063547][ T9810] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 693.148167][ T3879] Dev loop3: unable to read RDB block 1 [ 693.203978][ T3879] loop3: unable to read partition table [ 693.217940][ T9810] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 693.242362][ T3879] loop3: partition table beyond EOD, truncated 04:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f182b, 0x30051, r4, 0x0) 04:34:46 executing program 4: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:46 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 693.352645][ T9852] Dev loop2: unable to read RDB block 1 [ 693.408113][ T9852] loop2: unable to read partition table 04:34:46 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f192b, 0x30051, r4, 0x0) [ 693.468253][ T9852] loop2: partition table beyond EOD, truncated [ 693.499940][ T9852] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:46 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:46 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1a2b, 0x30051, r4, 0x0) [ 693.783722][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 693.798176][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 693.817866][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 693.928266][ T9884] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 693.938415][ T9882] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 693.962859][ T9884] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 693.972099][ T9887] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 694.008085][ T9884] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 694.013502][ T9882] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 694.039181][ T9894] Dev loop2: unable to read RDB block 1 [ 694.065572][ T9887] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 694.076293][ T9894] loop2: unable to read partition table [ 694.145043][ T9894] loop2: partition table beyond EOD, truncated 04:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1b2b, 0x30051, r4, 0x0) [ 694.254885][ T9894] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 694.291837][ T9882] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 694.299351][ T9887] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1c2b, 0x30051, r4, 0x0) [ 694.417628][ T9935] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:47 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 694.525207][ T9935] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:47 executing program 4: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 694.656574][ T9935] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:47 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:47 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1d2b, 0x30051, r4, 0x0) [ 694.824206][ T9991] Dev loop2: unable to read RDB block 1 [ 694.830201][ T9991] loop2: unable to read partition table 04:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1e2b, 0x30051, r4, 0x0) 04:34:47 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 694.876496][ T9991] loop2: partition table beyond EOD, truncated [ 694.899051][ T9991] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:47 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xff9f1f2b, 0x30051, r4, 0x0) [ 695.120998][ T9998] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf002b, 0x30051, r4, 0x0) [ 695.171405][ T9998] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 695.281256][ T9998] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 695.295995][T10035] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 695.337028][T10035] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 695.400491][T10043] Dev loop5: unable to read RDB block 1 [ 695.408988][T10035] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 695.430160][T10043] loop5: unable to read partition table [ 695.457111][T10049] Dev loop2: unable to read RDB block 1 [ 695.477812][T10049] loop2: unable to read partition table 04:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf012b, 0x30051, r4, 0x0) [ 695.518636][T10053] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 695.536276][T10043] loop5: partition table beyond EOD, truncated [ 695.570664][T10049] loop2: partition table beyond EOD, truncated [ 695.612212][T10053] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 695.638948][T10043] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 695.660679][T10049] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 695.692009][T10053] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:48 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 695.853106][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:48 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 695.913967][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 695.934963][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:49 executing program 4: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:49 executing program 3: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf022b, 0x30051, r4, 0x0) [ 696.192437][T10118] Dev loop2: unable to read RDB block 1 [ 696.224393][T10118] loop2: unable to read partition table 04:34:49 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 696.264085][T10118] loop2: partition table beyond EOD, truncated [ 696.271247][T10118] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 696.291076][T10137] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 696.304183][T10137] loop3: partition table partially beyond EOD, truncated 04:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf032b, 0x30051, r4, 0x0) [ 696.313890][T10137] loop3: p1 start 1 is beyond EOD, truncated [ 696.320112][T10137] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 696.342943][T10137] loop3: p3 size 2 extends beyond EOD, truncated [ 696.387183][T10137] loop3: p4 size 32768 extends beyond EOD, truncated [ 696.403505][T10131] Dev loop5: unable to read RDB block 1 [ 696.415599][T10131] loop5: unable to read partition table 04:34:49 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 696.478367][T10131] loop5: partition table beyond EOD, truncated [ 696.497886][T10137] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf042b, 0x30051, r4, 0x0) [ 696.529639][T10131] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 696.567231][T10166] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 696.576363][T10137] loop3: p6 size 32768 extends beyond EOD, truncated [ 696.586226][T10166] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 696.644530][T10166] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:49 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf052b, 0x30051, r4, 0x0) [ 696.913641][T10187] Dev loop2: unable to read RDB block 1 [ 696.920058][T10187] loop2: unable to read partition table [ 696.942390][T10187] loop2: partition table beyond EOD, truncated [ 696.950702][T10187] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 696.954955][T10172] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 697.000876][T10172] loop1: partition table partially beyond EOD, truncated 04:34:49 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 697.104134][T10172] loop1: p1 start 1 is beyond EOD, truncated [ 697.137486][T10172] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:50 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ff", 0x20, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 697.259117][T10172] loop1: p3 size 2 extends beyond EOD, truncated 04:34:50 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 697.344342][T10172] loop1: p4 size 32768 extends beyond EOD, truncated [ 697.354567][T10211] Dev loop2: unable to read RDB block 1 [ 697.363490][T10211] loop2: unable to read partition table [ 697.380523][T10172] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf062b, 0x30051, r4, 0x0) [ 697.395963][T10200] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 697.396428][T10172] loop1: p6 size 32768 extends beyond EOD, truncated [ 697.405731][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 697.426944][T10211] loop2: partition table beyond EOD, truncated [ 697.435606][T10211] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:50 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 697.447084][T10200] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 697.450388][ T3879] loop3: partition table partially beyond EOD, truncated 04:34:50 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 697.503760][ T3879] loop3: p1 start 1 is beyond EOD, truncated [ 697.504897][T10200] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 697.531506][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 697.599844][ T3879] loop3: p3 size 2 extends beyond EOD, truncated [ 697.650373][ T3879] loop3: p4 size 32768 extends beyond EOD, truncated [ 697.673960][T10241] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 697.681449][T10241] loop4: partition table partially beyond EOD, truncated [ 697.715951][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 697.781512][T10241] loop4: p1 start 1 is beyond EOD, truncated [ 697.811196][ T3879] loop3: p6 size 32768 extends beyond EOD, truncated [ 697.824596][T10264] Dev loop2: unable to read RDB block 1 [ 697.851708][T10241] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 697.868224][T10264] loop2: unable to read partition table [ 697.893033][T10241] loop4: p3 size 2 extends beyond EOD, truncated [ 697.900150][T10264] loop2: partition table beyond EOD, truncated [ 697.913326][T10264] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 697.925258][T10241] loop4: p4 size 32768 extends beyond EOD, truncated 04:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf072b, 0x30051, r4, 0x0) [ 697.946469][T10241] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 697.980333][T10241] loop4: p6 size 32768 extends beyond EOD, truncated 04:34:50 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 698.117505][T10259] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 698.144364][T10295] Dev loop3: unable to read RDB block 1 [ 698.148765][T10259] loop1: partition table partially beyond EOD, truncated [ 698.151705][T10295] loop3: unable to read partition table 04:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf082b, 0x30051, r4, 0x0) 04:34:51 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 698.174821][T10295] loop3: partition table beyond EOD, truncated [ 698.183345][T10295] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 698.239992][T10259] loop1: p1 start 1 is beyond EOD, truncated [ 698.284894][T10259] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:51 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 698.333912][T10304] Dev loop2: unable to read RDB block 1 [ 698.343691][T10304] loop2: unable to read partition table [ 698.359735][T10259] loop1: p3 size 2 extends beyond EOD, truncated [ 698.401759][T10304] loop2: partition table beyond EOD, truncated [ 698.488493][T10259] loop1: p4 size 32768 extends beyond EOD, truncated [ 698.502006][T10304] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 698.522416][T10259] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 698.524854][T10314] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf092b, 0x30051, r4, 0x0) 04:34:51 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 698.557178][T10259] loop1: p6 size 32768 extends beyond EOD, truncated [ 698.595497][T10314] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:51 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0a2b, 0x30051, r4, 0x0) 04:34:51 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 698.698634][T10314] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 698.709709][T10312] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 698.729196][T10312] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 698.802752][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 698.849755][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 698.850422][T10312] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 698.926504][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 698.955399][T10373] Dev loop2: unable to read RDB block 1 [ 698.969430][T10373] loop2: unable to read partition table [ 698.982672][T10373] loop2: partition table beyond EOD, truncated [ 699.014175][T10379] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 699.020449][T10379] loop4: partition table partially beyond EOD, truncated [ 699.032740][T10373] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 699.051934][T10379] loop4: p1 start 1 is beyond EOD, truncated [ 699.058411][T10379] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 699.081980][T10379] loop4: p3 size 2 extends beyond EOD, truncated [ 699.098481][T10379] loop4: p4 size 32768 extends beyond EOD, truncated [ 699.146468][T10379] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 699.175760][T10391] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 699.187476][T10391] loop1: partition table partially beyond EOD, truncated 04:34:52 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0b2b, 0x30051, r4, 0x0) [ 699.257195][T10379] loop4: p6 size 32768 extends beyond EOD, truncated [ 699.284961][T10391] loop1: p1 start 1 is beyond EOD, truncated 04:34:52 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030", 0x30, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:52 executing program 5: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 699.333323][T10391] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 699.406048][T10391] loop1: p3 size 2 extends beyond EOD, truncated [ 699.447502][T10391] loop1: p4 size 32768 extends beyond EOD, truncated [ 699.466731][T10391] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 699.487372][T10414] Dev loop2: unable to read RDB block 1 [ 699.496227][T10414] loop2: unable to read partition table [ 699.518490][T10414] loop2: partition table beyond EOD, truncated [ 699.549171][T10391] loop1: p6 size 32768 extends beyond EOD, truncated [ 699.599614][T10414] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 699.615435][T10432] Dev loop3: unable to read RDB block 1 [ 699.621768][T10432] loop3: unable to read partition table [ 699.627944][T10432] loop3: partition table beyond EOD, truncated [ 699.635763][T10432] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:34:52 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 699.770297][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 04:34:52 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0c2b, 0x30051, r4, 0x0) [ 699.805850][ T3879] loop4: partition table partially beyond EOD, truncated [ 699.815675][T10439] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 699.844911][T10439] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 699.875019][ T3879] loop4: p1 start 1 is beyond EOD, truncated [ 699.902085][T10439] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 699.912681][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:52 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 699.979180][ T3879] loop4: p3 size 2 extends beyond EOD, truncated [ 700.064578][ T3879] loop4: p4 size 32768 extends beyond EOD, truncated [ 700.095118][T10465] Dev loop2: unable to read RDB block 1 [ 700.128317][T10465] loop2: unable to read partition table [ 700.138507][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 700.147109][ T3879] loop4: p6 size 32768 extends beyond EOD, truncated [ 700.156667][T10463] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 700.160575][T10465] loop2: partition table beyond EOD, truncated [ 700.168575][T10465] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 700.169977][T10463] loop3: partition table partially beyond EOD, truncated [ 700.198677][T10463] loop3: p1 start 1 is beyond EOD, truncated [ 700.205875][T10463] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 700.221326][T10463] loop3: p3 size 2 extends beyond EOD, truncated 04:34:53 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 700.248891][T10463] loop3: p4 size 32768 extends beyond EOD, truncated [ 700.345627][T10463] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:53 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0d2b, 0x30051, r4, 0x0) [ 700.400913][T10463] loop3: p6 size 32768 extends beyond EOD, truncated 04:34:53 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 700.600946][T10512] Dev loop1: unable to read RDB block 1 [ 700.670604][T10512] loop1: unable to read partition table [ 700.693990][T10517] Dev loop2: unable to read RDB block 1 04:34:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0e2b, 0x30051, r4, 0x0) [ 700.723911][T10517] loop2: unable to read partition table [ 700.742090][T10512] loop1: partition table beyond EOD, truncated [ 700.763488][T10512] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 700.767034][T10517] loop2: partition table beyond EOD, truncated [ 700.792587][T10517] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 700.845008][T10514] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 700.850402][T10514] loop4: partition table partially beyond EOD, truncated [ 700.872940][T10514] loop4: p1 start 1 is beyond EOD, truncated 04:34:53 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 700.919608][T10514] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:34:53 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 701.025738][T10529] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 701.063545][T10514] loop4: p3 size 2 extends beyond EOD, truncated 04:34:54 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 701.104504][T10529] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 701.166783][T10514] loop4: p4 size 32768 extends beyond EOD, truncated [ 701.224002][T10551] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 701.231511][T10551] loop3: partition table partially beyond EOD, truncated [ 701.243739][T10529] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 701.253446][T10551] loop3: p1 start 1 is beyond EOD, truncated 04:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf0f2b, 0x30051, r4, 0x0) [ 701.277421][T10551] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 701.284156][T10514] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 701.345910][T10552] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 701.346956][T10514] loop4: p5 could not be added: 12 [ 701.368062][T10514] loop4: p6 size 32768 extends beyond EOD, truncated [ 701.381934][T10551] loop3: p3 size 2 extends beyond EOD, truncated [ 701.451776][T10559] Dev loop2: unable to read RDB block 1 [ 701.457908][T10559] loop2: unable to read partition table [ 701.467982][T10552] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 701.470366][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 701.488134][T10551] loop3: p4 size 32768 extends beyond EOD, truncated [ 701.532325][T10559] loop2: partition table beyond EOD, truncated [ 701.561154][ T3879] loop4: partition table partially beyond EOD, truncated [ 701.642782][T10559] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 701.649634][T10551] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 701.652671][ T3879] loop4: p1 start 1 is beyond EOD, truncated [ 701.678024][T10552] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 701.693253][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 701.705424][T10551] loop3: p6 size 32768 extends beyond EOD, truncated 04:34:54 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:54 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 701.762067][ T3879] loop4: p3 size 2 extends beyond EOD, truncated [ 701.797188][ T3879] loop4: p4 size 32768 extends beyond EOD, truncated 04:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf102b, 0x30051, r4, 0x0) [ 701.873594][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 701.922495][ T3879] loop4: p6 size 32768 extends beyond EOD, truncated 04:34:54 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:54 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b197", 0x23) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:55 executing program 1: ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 702.133317][T10609] Dev loop2: unable to read RDB block 1 [ 702.139285][T10609] loop2: unable to read partition table 04:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf112b, 0x30051, r4, 0x0) [ 702.186778][T10609] loop2: partition table beyond EOD, truncated [ 702.202419][T10609] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf122b, 0x30051, r4, 0x0) [ 702.423310][T10616] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:55 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 702.469386][T10616] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 702.484406][T10649] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 702.496196][T10649] loop3: partition table partially beyond EOD, truncated 04:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf132b, 0x30051, r4, 0x0) [ 702.551698][T10649] loop3: p1 start 1 is beyond EOD, truncated [ 702.567694][T10616] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 702.568470][T10660] Dev loop4: unable to read RDB block 1 [ 702.594120][T10649] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 702.600757][T10660] loop4: unable to read partition table [ 702.608097][T10660] loop4: partition table beyond EOD, truncated [ 702.615938][T10660] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 702.625014][ T3879] Dev loop4: unable to read RDB block 1 [ 702.630682][ T3879] loop4: unable to read partition table [ 702.640925][ T3879] loop4: partition table beyond EOD, truncated [ 702.662534][T10649] loop3: p3 size 2 extends beyond EOD, truncated [ 702.672751][T10659] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 702.686058][T10649] loop3: p4 size 32768 extends beyond EOD, truncated [ 702.722683][T10649] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 702.748594][T10649] loop3: p6 size 32768 extends beyond EOD, truncated 04:34:55 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf142b, 0x30051, r4, 0x0) [ 702.797684][T10659] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 702.877357][T10684] Dev loop2: unable to read RDB block 1 [ 702.952553][T10684] loop2: unable to read partition table [ 702.994207][T10684] loop2: partition table beyond EOD, truncated [ 703.000524][T10684] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 703.026488][T10659] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:55 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 703.059454][T10701] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 703.103038][T10701] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 703.176596][T10701] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:56 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947b1", 0x22) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:34:56 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf152b, 0x30051, r4, 0x0) 04:34:56 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 703.494205][T10740] Dev loop2: unable to read RDB block 1 [ 703.501493][T10740] loop2: unable to read partition table [ 703.508776][T10740] loop2: partition table beyond EOD, truncated [ 703.517920][T10740] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf162b, 0x30051, r4, 0x0) [ 703.674410][T10739] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:56 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 703.727297][T10739] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 703.813553][T10748] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 703.833309][T10748] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 703.895476][T10748] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf172b, 0x30051, r4, 0x0) 04:34:56 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 703.945489][T10739] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 703.997108][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 704.006345][T10795] Dev loop2: unable to read RDB block 1 [ 704.036659][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:56 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r0, 0xf2b, 0xc00e0000}, 0x14}}, 0x0) [ 704.045681][T10795] loop2: unable to read partition table [ 704.092289][T10795] loop2: partition table beyond EOD, truncated [ 704.115176][T10795] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 704.124448][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:57 executing program 4: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:57 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 704.366356][T10818] loop1: p1 < > p2 p3 < p5 p6 > p4 04:34:57 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:57 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf182b, 0x30051, r4, 0x0) [ 704.415365][T10818] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 704.515626][T10818] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 704.583506][T10838] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 704.641737][T10838] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 704.676839][T10847] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 704.713781][T10851] Dev loop2: unable to read RDB block 1 [ 704.726231][T10851] loop2: unable to read partition table [ 704.765362][T10847] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 704.830510][T10851] loop2: partition table beyond EOD, truncated [ 704.864538][T10838] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf192b, 0x30051, r4, 0x0) [ 704.882406][T10847] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 704.889662][T10851] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 705.025046][T10880] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 705.075656][T10880] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 705.100175][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:34:58 executing program 1: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:58 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 705.130003][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 705.195761][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1a2b, 0x30051, r4, 0x0) [ 705.254552][T10880] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:34:58 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 705.384735][T10926] Dev loop2: unable to read RDB block 1 [ 705.391901][T10926] loop2: unable to read partition table [ 705.404654][T10926] loop2: partition table beyond EOD, truncated [ 705.416255][T10926] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:58 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:58 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 705.554021][T10955] Dev loop4: unable to read RDB block 1 [ 705.568176][T10955] loop4: unable to read partition table [ 705.613158][T10955] loop4: partition table beyond EOD, truncated 04:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1b2b, 0x30051, r4, 0x0) [ 705.680252][T10955] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 705.703536][T10967] Dev loop3: unable to read RDB block 1 [ 705.709761][T10967] loop3: unable to read partition table [ 705.716997][T10967] loop3: partition table beyond EOD, truncated [ 705.724185][T10967] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 705.743705][T10945] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 705.759929][T10945] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:34:58 executing program 5: tkill(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 705.808399][T10945] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1c2b, 0x30051, r4, 0x0) 04:34:58 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 706.003989][T10973] Dev loop2: unable to read RDB block 1 [ 706.040137][T10973] loop2: unable to read partition table 04:34:59 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 706.077723][T10973] loop2: partition table beyond EOD, truncated [ 706.105607][T10973] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:34:59 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 706.401493][T11004] loop5: p1 < > p2 p3 < p5 p6 > p4 04:34:59 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1d2b, 0x30051, r4, 0x0) [ 706.448554][T11004] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 706.495829][T11008] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 706.552250][T11004] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 706.562985][T11008] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 706.578763][T11015] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 706.599808][T11015] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:34:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1e2b, 0x30051, r4, 0x0) [ 706.623210][T11024] Dev loop2: unable to read RDB block 1 [ 706.629097][T11024] loop2: unable to read partition table [ 706.675205][T11015] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 706.715513][T11008] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 706.723224][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 706.741825][T11024] loop2: partition table beyond EOD, truncated [ 706.748160][T11024] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 706.782478][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 706.829874][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:34:59 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 707.017137][T11072] Dev loop1: unable to read RDB block 1 [ 707.037394][T11072] loop1: unable to read partition table 04:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffaf1f2b, 0x30051, r4, 0x0) 04:35:00 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 707.117414][T11072] loop1: partition table beyond EOD, truncated [ 707.142939][T11072] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:35:00 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:00 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:00 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:00 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 707.424109][T11120] Dev loop3: unable to read RDB block 1 [ 707.431522][T11120] loop3: unable to read partition table [ 707.439281][T11120] loop3: partition table beyond EOD, truncated [ 707.457348][T11120] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 707.478332][ T3879] Dev loop3: unable to read RDB block 1 [ 707.525876][ T3879] loop3: unable to read partition table [ 707.584974][ T3879] loop3: partition table beyond EOD, truncated 04:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf002b, 0x30051, r4, 0x0) 04:35:00 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 707.793374][T11133] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 707.860030][T11133] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 707.952865][T11133] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 707.984982][T11127] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 708.014811][T11127] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 708.027089][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 708.044854][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:35:01 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf012b, 0x30051, r4, 0x0) [ 708.145658][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 708.176131][T11160] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 708.210268][T11127] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 708.235671][T11160] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 708.309726][T11137] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 708.377784][T11160] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 708.416366][T11137] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:35:01 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf022b, 0x30051, r4, 0x0) [ 708.530277][T11137] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:35:01 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:01 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:35:01 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 708.791624][T11218] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 708.797191][T11218] loop5: partition table partially beyond EOD, truncated [ 708.876165][T11218] loop5: p1 start 1 is beyond EOD, truncated [ 708.884106][T11218] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 708.901992][T11218] loop5: p3 size 2 extends beyond EOD, truncated [ 708.925116][T11218] loop5: p4 size 32768 extends beyond EOD, truncated [ 708.939857][T11218] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 708.960990][T11218] loop5: p6 size 32768 extends beyond EOD, truncated 04:35:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf032b, 0x30051, r4, 0x0) [ 709.023430][T11246] loop2: p1 < > p2 p3 < p5 p6 > p4 04:35:01 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 709.064590][T11246] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 709.167019][T11246] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 709.229479][T11265] loop4: p1 < > p2 p3 < p5 p6 > p4 04:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf042b, 0x30051, r4, 0x0) [ 709.304392][T11265] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 709.317666][T11264] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 709.399679][T11264] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 709.506014][T11265] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 709.518421][T11264] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 709.532334][T11286] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 709.548410][T11286] loop3: partition table partially beyond EOD, truncated [ 709.644085][T11286] loop3: p1 start 1 is beyond EOD, truncated 04:35:02 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 709.734222][T11286] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:35:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf052b, 0x30051, r4, 0x0) [ 709.799478][T11286] loop3: p3 size 2 extends beyond EOD, truncated 04:35:02 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) [ 709.881823][T11286] loop3: p4 size 32768 extends beyond EOD, truncated 04:35:02 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 709.952232][T11286] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:02 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02", 0x1b) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 710.013539][T11286] loop3: p6 size 32768 extends beyond EOD, truncated [ 710.072060][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 710.095928][ T3879] loop3: partition table partially beyond EOD, truncated [ 710.142264][ T3879] loop3: p1 start 1 is beyond EOD, truncated [ 710.154460][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 710.184685][ T3879] loop3: p3 size 2 extends beyond EOD, truncated 04:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf062b, 0x30051, r4, 0x0) [ 710.235612][ T3879] loop3: p4 size 32768 extends beyond EOD, truncated [ 710.244817][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 710.260119][ T3879] loop3: p6 size 32768 extends beyond EOD, truncated [ 710.261913][T11333] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 710.290536][T11333] loop5: partition table partially beyond EOD, truncated [ 710.299370][T11333] loop5: p1 start 1 is beyond EOD, truncated [ 710.306832][T11333] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 710.322415][T11333] loop5: p3 size 2 extends beyond EOD, truncated 04:35:03 executing program 3: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02", 0x1b) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 710.351537][T11333] loop5: p4 size 32768 extends beyond EOD, truncated [ 710.382695][T11333] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 710.402282][T11333] loop5: p6 size 32768 extends beyond EOD, truncated [ 710.417732][T11360] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 710.458401][T11360] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 710.493586][T11355] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 710.543911][T11353] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 710.549709][T11353] loop4: partition table partially beyond EOD, truncated [ 710.569080][T11355] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 710.648019][T11360] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 710.676894][T11353] loop4: p1 start 1 is beyond EOD, truncated [ 710.751121][T11353] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf072b, 0x30051, r4, 0x0) [ 710.846933][T11355] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 710.874562][T11353] loop4: p3 size 2 extends beyond EOD, truncated [ 710.923620][T11399] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 710.952520][T11399] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 710.954137][T11353] loop4: p4 size 32768 extends beyond EOD, truncated 04:35:03 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, 0x0, 0x14040000) 04:35:03 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 710.994195][T11399] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 711.083479][T11353] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 711.157514][T11353] loop4: p6 size 32768 extends beyond EOD, truncated [ 711.223418][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 04:35:04 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02", 0x1b) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 711.268891][ T3879] loop4: partition table partially beyond EOD, truncated [ 711.295720][T11435] loop2: p1 < > p2 p3 < p5 p6 > p4 04:35:04 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 711.346506][ T3879] loop4: p1 start 1 is beyond EOD, truncated [ 711.372675][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 711.385644][ T3879] loop4: p3 size 2 extends beyond EOD, truncated 04:35:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf082b, 0x30051, r4, 0x0) [ 711.391684][T11435] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 711.400471][ T3879] loop4: p4 size 32768 extends beyond EOD, truncated [ 711.417534][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 711.442810][T11437] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 711.448467][T11437] loop5: partition table partially beyond EOD, truncated [ 711.481384][T11437] loop5: p1 start 1 is beyond EOD, truncated [ 711.493063][T11437] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 711.513395][T11435] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 711.514864][T11437] loop5: p3 size 2 extends beyond EOD, truncated [ 711.526894][ T3879] loop4: p6 size 32768 extends beyond EOD, truncated [ 711.549076][T11437] loop5: p4 size 32768 extends beyond EOD, truncated [ 711.626142][T11437] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:35:04 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 711.731912][T11437] loop5: p6 size 32768 extends beyond EOD, truncated 04:35:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf092b, 0x30051, r4, 0x0) [ 711.903461][T11495] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 711.919936][T11495] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 712.046722][T11497] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 712.060786][T11497] loop1: p2 size 1073741824 extends beyond EOD, truncated 04:35:05 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 712.095333][T11497] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:35:05 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 712.171541][T11495] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:35:05 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0a2b, 0x30051, r4, 0x0) [ 712.475125][T11528] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 712.526970][T11528] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:35:05 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 712.619752][T11528] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0b2b, 0x30051, r4, 0x0) 04:35:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0c2b, 0x30051, r4, 0x0) [ 712.818148][T11552] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 712.835934][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:35:05 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02", 0x1b) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 712.886995][T11552] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 712.896885][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 712.905915][T11549] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 712.933568][T11549] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 712.955375][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 712.971734][T11549] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 712.984426][T11552] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:35:06 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 713.171988][T11607] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 713.280450][T11607] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:35:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0d2b, 0x30051, r4, 0x0) [ 713.405597][T11626] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 713.414971][T11607] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 713.431091][T11626] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 713.465125][T11626] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:06 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 713.554529][T11624] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 713.567482][T11624] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 713.596121][T11624] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 713.652326][ T3879] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 713.725706][ T3879] loop4: p2 size 1073741824 extends beyond EOD, truncated 04:35:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0e2b, 0x30051, r4, 0x0) [ 713.806140][ T3879] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:35:06 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:06 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff75947", 0x21) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:35:07 executing program 1: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e", 0x12) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 714.191394][T11697] loop2: p1 < > p2 p3 < p5 p6 > p4 04:35:07 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 714.302737][T11697] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 714.353323][T11722] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 714.369801][T11722] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 714.389790][T11697] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 714.398888][T11722] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf0f2b, 0x30051, r4, 0x0) [ 714.435075][T11714] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 714.530745][T11714] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 714.564061][T11715] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 714.623219][T11715] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 714.722053][T11714] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 714.790609][T11715] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 714.822564][T11748] loop3: p1 < > p2 p3 < p5 p6 > p4 04:35:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf102b, 0x30051, r4, 0x0) [ 714.870991][T11748] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:35:07 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:07 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 715.050380][T11748] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf112b, 0x30051, r4, 0x0) 04:35:08 executing program 5: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200), 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 715.249658][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:35:08 executing program 4: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 715.280859][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 715.329393][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 715.530895][T11820] loop2: p1 < > p2 p3 < p5 p6 > p4 04:35:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf122b, 0x30051, r4, 0x0) [ 715.605733][T11820] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 715.617816][T11813] loop1: p1 < > p2 p3 < p5 p6 > p4 04:35:08 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 715.675393][T11813] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 715.744671][T11832] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 715.769697][T11820] loop2: p5 size 1073741824 extends beyond EOD, [ 715.774468][T11847] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 715.796219][T11813] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 715.815367][T11832] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 715.823952][T11820] truncated [ 715.883769][T11847] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 715.904803][T11863] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 715.933757][T11863] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 715.978068][T11863] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 716.111899][T11832] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 716.149534][T11847] loop4: p5 size 1073741824 extends beyond EOD, truncated 04:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf132b, 0x30051, r4, 0x0) 04:35:09 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:09 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:09 executing program 5: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 716.568446][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 04:35:09 executing program 4: tkill(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 716.606376][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 716.663631][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:09 executing program 3: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff7", 0x1f) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a7536aa0d9fa1bfcaef77919caeea932a56aa53a0dac4f2b92097e9f65e36e4e2ff9068"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf142b, 0x30051, r4, 0x0) [ 716.803013][T11942] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 716.874100][T11942] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 717.017861][T11942] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 717.052691][T11973] loop4: p1 < > p2 p3 < p5 p6 > p4 [ 717.112931][T11973] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 717.141034][T11965] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 717.177406][T11965] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 717.193490][T11966] loop1: p1 < > p2 p3 < p5 p6 > p4 04:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf152b, 0x30051, r4, 0x0) [ 717.262960][T11989] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 717.278004][T11966] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 717.302483][T11989] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 717.369361][T11973] loop4: p5 size 1073741824 extends beyond EOD, truncated [ 717.395000][T11965] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 717.411220][T11966] loop1: p5 size 1073741824 extends beyond EOD, truncated 04:35:10 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 717.608174][T11989] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:10 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r0, 0xf2b}, 0x14}}, 0x0) 04:35:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf162b, 0x30051, r4, 0x0) 04:35:10 executing program 5 (fault-call:3 fault-nth:0): write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855b", 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27fa6cee60bb5b8c1dce68a0f06c17d7751a75"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 717.815678][ T3879] loop3: p1 < > p2 p3 < p5 p6 > p4 [ 717.840875][ T3879] loop3: p2 size 1073741824 extends beyond EOD, truncated 04:35:10 executing program 4 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 717.905407][ T3879] loop3: p5 size 1073741824 extends beyond EOD, truncated 04:35:10 executing program 3 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 718.044575][T12087] FAULT_INJECTION: forcing a failure. [ 718.044575][T12087] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 718.063720][T12059] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 718.065568][T12087] CPU: 1 PID: 12087 Comm: syz-executor.5 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 718.079055][T12087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.089116][T12087] Call Trace: [ 718.092419][T12087] dump_stack+0x18f/0x20d [ 718.094462][T12059] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 718.096760][T12087] should_fail.cold+0x5/0x14 [ 718.096775][T12087] ? should_fail+0x4/0x5a0 [ 718.096800][T12087] __alloc_pages_nodemask+0x1db/0x2a20 [ 718.096818][T12087] ? ktime_get+0x3e/0x120 [ 718.096840][T12087] ? mark_lock+0xbc/0x1710 [ 718.127091][T12087] ? lock_downgrade+0x820/0x820 [ 718.131966][T12087] ? warn_alloc+0x120/0x120 [ 718.136486][T12087] ? hrtimer_forward+0x1cc/0x260 [ 718.141442][T12087] ? mark_lock+0xbc/0x1710 [ 718.145957][T12087] ? mark_lock+0xbc/0x1710 [ 718.150381][T12087] ? kvm_sched_clock_read+0x14/0x40 [ 718.155585][T12087] alloc_pages_vma+0xdd/0x720 [ 718.160274][T12087] wp_page_copy+0xb8b/0x17d0 [ 718.164879][T12087] ? do_wp_page+0x699/0x1950 [ 718.169484][T12087] ? print_bad_pte+0x640/0x640 [ 718.174254][T12087] ? lock_downgrade+0x820/0x820 [ 718.179115][T12087] ? vm_normal_page+0x148/0x380 [ 718.183981][T12087] do_wp_page+0x6a1/0x1950 [ 718.185158][T12059] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 718.188401][T12087] ? do_raw_spin_lock+0x120/0x2b0 [ 718.188423][T12087] ? finish_mkwrite_fault+0x6b0/0x6b0 [ 718.188436][T12087] ? rwlock_bug.part.0+0x90/0x90 [ 718.188450][T12087] ? do_page_mkwrite+0x530/0x530 [ 718.188473][T12087] handle_mm_fault+0x36fd/0x45e0 [ 718.188497][T12087] ? apply_to_existing_page_range+0x40/0x40 [ 718.226601][T12087] do_user_addr_fault+0x598/0xbf0 [ 718.231663][T12087] exc_page_fault+0xab/0x170 [ 718.236368][T12087] ? asm_exc_page_fault+0x8/0x30 [ 718.241319][T12087] asm_exc_page_fault+0x1e/0x30 [ 718.246168][T12087] RIP: 0033:0x401b5d [ 718.250063][T12087] Code: Bad RIP value. [ 718.254312][T12087] RSP: 002b:00007f8aa48599d8 EFLAGS: 00010287 [ 718.260380][T12087] RAX: 0000000000000000 RBX: 000000000050c240 RCX: 0000000020000ff8 [ 718.268372][T12087] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000c1ffffe [ 718.276385][T12087] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 718.284450][T12087] R10: 0000000020002a68 R11: 0000000008100000 R12: 0000000000000004 04:35:11 executing program 1 (fault-call:5 fault-nth:0): tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 718.292460][T12087] R13: 0000000000000c95 R14: 00000000004c1cd5 R15: 00007f8aa485a6d4 04:35:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf172b, 0x30051, r4, 0x0) [ 718.500997][T12111] FAULT_INJECTION: forcing a failure. [ 718.500997][T12111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.532013][T12087] syz-executor.5 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 718.560446][T12111] CPU: 1 PID: 12111 Comm: syz-executor.1 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 718.570458][T12111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.580606][T12111] Call Trace: [ 718.583908][T12111] dump_stack+0x18f/0x20d [ 718.588254][T12111] should_fail.cold+0x5/0x14 [ 718.592869][T12111] __alloc_pages_nodemask+0x1db/0x2a20 [ 718.598340][T12111] ? __lock_acquire+0x16e3/0x56e0 [ 718.603386][T12111] ? warn_alloc+0x120/0x120 [ 718.607902][T12111] ? mark_lock+0xbc/0x1710 [ 718.612333][T12111] ? mark_held_locks+0x9f/0xe0 [ 718.617109][T12111] ? mark_lock+0xbc/0x1710 [ 718.621540][T12111] alloc_pages_vma+0xdd/0x720 [ 718.626229][T12111] wp_page_copy+0xb8b/0x17d0 [ 718.630830][T12111] ? do_wp_page+0x699/0x1950 [ 718.635432][T12111] ? print_bad_pte+0x640/0x640 [ 718.640210][T12111] ? lock_downgrade+0x820/0x820 [ 718.645067][T12111] ? vm_normal_page+0x148/0x380 [ 718.649929][T12111] ? handle_mm_fault+0x2112/0x45e0 [ 718.655056][T12111] do_wp_page+0x6a1/0x1950 [ 718.659480][T12111] ? do_raw_spin_lock+0x120/0x2b0 [ 718.664512][T12111] ? finish_mkwrite_fault+0x6b0/0x6b0 [ 718.669973][T12111] ? rwlock_bug.part.0+0x90/0x90 [ 718.674919][T12111] ? do_page_mkwrite+0x530/0x530 [ 718.679940][T12111] handle_mm_fault+0x36fd/0x45e0 [ 718.684935][T12111] ? apply_to_existing_page_range+0x40/0x40 [ 718.690862][T12111] do_user_addr_fault+0x598/0xbf0 [ 718.695902][T12111] exc_page_fault+0xab/0x170 [ 718.700480][T12111] ? asm_exc_page_fault+0x8/0x30 [ 718.705402][T12111] asm_exc_page_fault+0x1e/0x30 [ 718.710245][T12111] RIP: 0033:0x401b5d [ 718.714114][T12111] Code: Bad RIP value. [ 718.718331][T12111] RSP: 002b:00007f704b4b99d8 EFLAGS: 00010287 [ 718.724384][T12111] RAX: 0000000000000000 RBX: 000000000050c240 RCX: 0000000020000ff8 [ 718.732336][T12111] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000fe00028 [ 718.740304][T12111] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 718.748256][T12111] R10: 0000000020002a68 R11: 0000000008100000 R12: 0000000000000004 [ 718.756649][T12111] R13: 0000000000000c95 R14: 00000000004c1cd5 R15: 00007f704b4ba6d4 [ 718.784567][T12115] FAULT_INJECTION: forcing a failure. [ 718.784567][T12115] name failslab, interval 1, probability 0, space 0, times 0 [ 718.801244][T12087] CPU: 0 PID: 12087 Comm: syz-executor.5 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 718.811154][T12087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.817396][T12118] FAULT_INJECTION: forcing a failure. [ 718.817396][T12118] name failslab, interval 1, probability 0, space 0, times 0 [ 718.821209][T12087] Call Trace: [ 718.821247][T12087] dump_stack+0x18f/0x20d [ 718.821264][T12087] dump_header+0x106/0x60f [ 718.821281][T12087] out_of_memory.cold+0xf/0x182 [ 718.821299][T12087] ? oom_killer_disable+0x270/0x270 [ 718.821317][T12087] ? mutex_trylock+0x247/0x2c0 [ 718.821338][T12087] pagefault_out_of_memory+0x109/0x11c [ 718.866760][T12087] ? out_of_memory+0x1340/0x1340 [ 718.871724][T12087] mm_fault_error+0x123/0x380 [ 718.876424][T12087] do_user_addr_fault+0x5f8/0xbf0 [ 718.881512][T12087] exc_page_fault+0xab/0x170 [ 718.886118][T12087] ? asm_exc_page_fault+0x8/0x30 [ 718.891065][T12087] asm_exc_page_fault+0x1e/0x30 [ 718.895910][T12087] RIP: 0033:0x401b5d [ 718.899799][T12087] Code: Bad RIP value. [ 718.903864][T12087] RSP: 002b:00007f8aa48599d8 EFLAGS: 00010287 [ 718.909929][T12087] RAX: 0000000000000000 RBX: 000000000050c240 RCX: 0000000020000ff8 [ 718.917907][T12087] RDX: 0000000000000000 RSI: 0000000008100000 RDI: 000000000c1ffffe [ 718.925881][T12087] RBP: 000000000078bf00 R08: 0000000000000000 R09: fe03f80fe03f80ff [ 718.933851][T12087] R10: 0000000020002a68 R11: 0000000008100000 R12: 0000000000000004 [ 718.941827][T12087] R13: 0000000000000c95 R14: 00000000004c1cd5 R15: 00007f8aa485a6d4 [ 718.954220][T12118] CPU: 1 PID: 12118 Comm: syz-executor.4 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 718.964145][T12118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.974202][T12118] Call Trace: [ 718.977504][T12118] dump_stack+0x18f/0x20d [ 718.981849][T12118] should_fail.cold+0x5/0x14 [ 718.986460][T12118] ? strndup_user+0x70/0xe0 [ 718.990971][T12118] should_failslab+0x5/0xf [ 718.995396][T12118] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 719.001470][T12118] __kmalloc_track_caller+0x6d/0x310 [ 719.006763][T12118] memdup_user+0x22/0xd0 [ 719.011013][T12118] strndup_user+0x70/0xe0 [ 719.015348][T12118] __x64_sys_mount+0xe6/0x230 [ 719.020125][T12118] do_syscall_64+0x60/0xe0 [ 719.025159][T12118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 719.031049][T12118] RIP: 0033:0x45cba9 [ 719.034940][T12118] Code: Bad RIP value. [ 719.038998][T12118] RSP: 002b:00007fe353bf6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.047410][T12118] RAX: ffffffffffffffda RBX: 00000000004f80c0 RCX: 000000000045cba9 [ 719.055382][T12118] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 719.063349][T12118] RBP: 000000000078bfa0 R08: 0000000020000100 R09: 0000000000000000 [ 719.071323][T12118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 719.079294][T12118] R13: 000000000000078f R14: 00000000004ca7d2 R15: 00007fe353bf76d4 [ 719.089085][T12115] CPU: 0 PID: 12115 Comm: syz-executor.3 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 719.098991][T12115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.109045][T12115] Call Trace: [ 719.112346][T12115] dump_stack+0x18f/0x20d [ 719.116687][T12115] should_fail.cold+0x5/0x14 [ 719.121290][T12115] ? strndup_user+0x70/0xe0 [ 719.126419][T12115] should_failslab+0x5/0xf [ 719.130856][T12115] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 719.136933][T12115] __kmalloc_track_caller+0x6d/0x310 [ 719.142232][T12115] memdup_user+0x22/0xd0 [ 719.143268][T12087] Mem-Info: [ 719.146473][T12115] strndup_user+0x70/0xe0 [ 719.146490][T12115] __x64_sys_mount+0xe6/0x230 [ 719.146509][T12115] do_syscall_64+0x60/0xe0 [ 719.150258][T12087] active_anon:251395 inactive_anon:4143 isolated_anon:0 [ 719.150258][T12087] active_file:8949 inactive_file:69003 isolated_file:0 [ 719.150258][T12087] unevictable:0 dirty:256 writeback:0 [ 719.150258][T12087] slab_reclaimable:18419 slab_unreclaimable:125908 [ 719.150258][T12087] mapped:60973 shmem:4380 pagetables:46686 bounce:0 [ 719.150258][T12087] free:603377 free_pcp:582 free_cma:0 [ 719.153920][T12115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 719.153934][T12115] RIP: 0033:0x45cba9 [ 719.153943][T12115] Code: Bad RIP value. [ 719.159190][T12087] Node 0 active_anon:956496kB inactive_anon:16524kB active_file:34612kB inactive_file:275496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243892kB dirty:596kB writeback:0kB shmem:17432kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 636928kB writeback_tmp:0kB kernel_stack:52736kB all_unreclaimable? no [ 719.162989][T12115] RSP: 002b:00007f4910116c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.163002][T12115] RAX: ffffffffffffffda RBX: 00000000004f80c0 RCX: 000000000045cba9 [ 719.163009][T12115] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 719.163017][T12115] RBP: 000000000078bfa0 R08: 0000000020000100 R09: 0000000000000000 [ 719.163024][T12115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 04:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf182b, 0x30051, r4, 0x0) [ 719.163031][T12115] R13: 000000000000078f R14: 00000000004ca7d2 R15: 00007f49101176d4 04:35:12 executing program 4 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) 04:35:12 executing program 2: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) 04:35:12 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@index_off='index=off'}]}) [ 719.430438][T12111] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 719.440424][T12111] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 719.471471][T12111] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 719.513217][T12087] Node 1 active_anon:49196kB inactive_anon:52kB active_file:1212kB inactive_file:556kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:392kB writeback:100kB shmem:84kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:13504kB all_unreclaimable? no 04:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf192b, 0x30051, r4, 0x0) [ 719.545099][T12087] Node 0 DMA free:10280kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:3456kB inactive_anon:0kB active_file:12kB inactive_file:20kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 719.575760][T12087] lowmem_reserve[]: 0 2515 2515 2515 2515 [ 719.582193][T12087] Node 0 DMA32 free:108596kB min:107596kB low:116572kB high:125548kB reserved_highatomic:0KB active_anon:953040kB inactive_anon:16520kB active_file:34600kB inactive_file:275476kB unevictable:0kB writepending:596kB present:3129332kB managed:2578208kB mlocked:0kB pagetables:143960kB bounce:0kB free_pcp:408kB local_pcp:352kB free_cma:0kB 04:35:12 executing program 1: tkill(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="9c75883538f79ab0e63b0060981a855cdc5e50855be436e37cca02aab21ff759", 0x20) ftruncate(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="78bc569a33e1a385772486856dd6b7adf8dddb609759ac4a2e9a85dc7835518816ee87781d386fc79e486ed7954dbd31098ef5cf81aaa08c3dba90140a3674daadd1be144e38bbffaa38525cd02bf3c5152acd08895d80f3cd6673d1e213a68e5ca921b8c601d17835bba07b0e90227b9f7a7e7387b4ed97d8bd81d2bfc2db7f8b27"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24004044}, 0x14040000) [ 719.675577][T12087] lowmem_reserve[]: 0 0 0 0 0 [ 719.701820][T12087] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 719.803113][T12156] loop2: p1 < > p2 p3 < p5 p6 > p4 [ 719.826900][T12156] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 719.862201][T12087] lowmem_reserve[]: 0 0 0 0 0 [ 719.867037][T12087] Node 1 Normal free:2287284kB min:53972kB low:67464kB high:80956kB reserved_highatomic:0KB active_anon:49396kB inactive_anon:52kB active_file:1212kB inactive_file:556kB unevictable:0kB writepending:196kB present:3932160kB managed:3870200kB mlocked:0kB pagetables:43096kB bounce:0kB free_pcp:2280kB local_pcp:1152kB free_cma:0kB [ 719.900729][T12087] lowmem_reserve[]: 0 0 0 0 0 [ 719.905551][T12087] Node 0 DMA: 2*4kB (M) 2*8kB (UM) 3*16kB (UM) 1*32kB (U) 3*64kB (UM) 2*128kB (U) 2*256kB (U) 2*512kB (UM) 2*1024kB (U) 1*2048kB (M) 1*4096kB (M) = 10280kB [ 719.924731][T12186] FAULT_INJECTION: forcing a failure. [ 719.924731][T12186] name failslab, interval 1, probability 0, space 0, times 0 [ 719.937918][T12087] Node 0 DMA32: 173*4kB (M) 431*8kB (UME) 162*16kB (UME) 90*32kB (UME) 27*64kB (UME) 6*128kB (UE) 0*256kB 188*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 108364kB [ 719.941153][T12172] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 719.961445][T12186] CPU: 1 PID: 12186 Comm: syz-executor.4 Not tainted 5.8.0-rc4-next-20200710-syzkaller #0 [ 719.971357][T12186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.981418][T12186] Call Trace: [ 719.984719][T12186] dump_stack+0x18f/0x20d [ 719.989062][T12186] should_fail.cold+0x5/0x14 [ 719.993668][T12186] should_failslab+0x5/0xf [ 719.998098][T12186] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 720.004185][T12186] kmem_cache_alloc_trace+0x49/0x2c0 [ 720.009481][T12186] ? _copy_from_user+0x138/0x190 [ 720.012298][T12156] loop2: p5 size 1073741824 extends beyond EOD, truncated [ 720.014607][T12186] copy_mount_options+0x55/0x180 [ 720.014627][T12186] __x64_sys_mount+0x15b/0x230 [ 720.014647][T12186] do_syscall_64+0x60/0xe0 [ 720.014667][T12186] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 720.014680][T12186] RIP: 0033:0x45cba9 [ 720.014693][T12186] Code: Bad RIP value. [ 720.036548][T12087] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 720.041743][T12186] RSP: 002b:00007fe353bf6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.041759][T12186] RAX: ffffffffffffffda RBX: 00000000004f80c0 RCX: 000000000045cba9 04:35:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x20a926, 0x3b, 0x0, 0xffffffffffffffff}) r4 = dup(r3) mmap(&(0x7f000000a000/0x200000)=nil, 0x201300, 0xffbf1a2b, 0x30051, r4, 0x0) [ 720.041769][T12186] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 720.041779][T12186] RBP: 000000000078bfa0 R08: 0000000020000100 R09: 0000000000000000 [ 720.041788][T12186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 720.041798][T12186] R13: 000000000000078f R14: 00000000004ca7d2 R15: 00007fe353bf76d4 [ 720.087919][T12180] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 720.158139][T12172] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 720.225346][T12172] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 720.233615][T12180] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 720.360243][T12087] Node 1 Normal: 3941*4kB (UME) 1389*8kB (UM) 2591*16kB (UME) 1066*32kB (UM) 1390*64kB (U) 1228*128kB (UM) 1229*256kB (UM) 1134*512kB (UME) 749*1024kB (U) 53*2048kB (UE) 40*4096kB (M) = 2283180kB [ 720.511393][T12087] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 720.522018][T12087] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 720.532390][T12087] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 720.545075][T12087] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 720.604283][T12087] 47883 total pagecache pages [ 720.629640][T12087] 0 pages in swap cache [ 720.644416][T12087] Swap cache stats: add 0, delete 0, find 0/0 [ 720.663608][T12087] Free swap = 0kB [ 720.680102][T12087] Total swap = 0kB [ 720.688122][T12087] 1965979 pages RAM [ 720.696864][T12087] 0 pages HighMem/MovableOnly [ 720.706331][T12087] 349900 pages reserved [ 720.712113][T12087] 0 pages cma reserved [ 720.716267][T12087] Out of memory and no killable processes...