syzkaller login: [ 65.036891][ T37] audit: type=1400 audit(1575128747.210:41): avc: denied { map } for pid=7975 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:36653' (ECDSA) to the list of known hosts. [ 67.191311][ T37] audit: type=1400 audit(1575128749.360:42): avc: denied { map } for pid=7985 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16525 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/30 15:45:49 fuzzer started 2019/11/30 15:45:49 dialing manager at 10.0.2.10:40921 2019/11/30 15:45:50 syscalls: 2533 2019/11/30 15:45:50 code coverage: enabled 2019/11/30 15:45:50 comparison tracing: enabled 2019/11/30 15:45:50 extra coverage: extra coverage is not supported by the kernel 2019/11/30 15:45:50 setuid sandbox: enabled 2019/11/30 15:45:50 namespace sandbox: enabled 2019/11/30 15:45:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 15:45:50 fault injection: enabled 2019/11/30 15:45:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 15:45:50 net packet injection: enabled 2019/11/30 15:45:50 net device setup: enabled 2019/11/30 15:45:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 15:45:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:46:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 80.673545][ T37] audit: type=1400 audit(1575128762.850:43): avc: denied { map } for pid=8010 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=58 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 15:46:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000100738d7a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000030000cf0a000000000000000000000900000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaba86b97eec0b2bed61a83364b10d6aad51020000e2a1db3c6a31e30dee4afc66d2442805400039389a804c41c2993fc67e8a146045e14e8a0800550e6a25975bc1710d35f1a373c0ef65f6ec71f0084254d140187fafa4a1ee6ece53c67385b8838aa36ad24a7dce0973c362bd726a8ab11b0a0b00e77e6c16503cf47ce47302bdd311378eaab7372dab5eef84c31b3cad868a53e6f5e69746a7a0beda0686d2ae4d394286e5c81eae45e3a25b942b8da11edb578b453acab1d57f25833d4d4c13eef0e0e62be2015eedef3c32984c6c4b2b9c33d8a624cea95c3b3c6dd8735690f4786fc5166b0300000400000000acd414284daccbe4ff948ff8878f4d44216ac810ace3b99ab2ceb6834eb6c6fa67a0f72dba663918f6e3a6e4fa340d1bbc72a08c59848ea19a9590b766ad5513ec1a0482d0f66d3a00c16d4d968399664326f01e97545a5eeb0619a05081bccda66c4a2e77a74315133b78514b344590fd9c842d645a0e960c0000ffffffffffffffff000000"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) [ 80.849698][ T8011] IPVS: ftp: loaded support on port[0] = 21 [ 80.923867][ T8011] chnl_net:caif_netlink_parms(): no params data found [ 80.949964][ T8011] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.960074][ T8011] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.967955][ T8011] device bridge_slave_0 entered promiscuous mode [ 80.976329][ T8011] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.983388][ T8011] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.990788][ T8011] device bridge_slave_1 entered promiscuous mode [ 81.007549][ T8011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.018109][ T8011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.019133][ T8014] IPVS: ftp: loaded support on port[0] = 21 [ 81.044247][ T8011] team0: Port device team_slave_0 added [ 81.052243][ T8011] team0: Port device team_slave_1 added [ 81.176685][ T8011] device hsr_slave_0 entered promiscuous mode [ 81.242274][ T8011] device hsr_slave_1 entered promiscuous mode [ 81.311418][ T37] audit: type=1400 audit(1575128763.480:44): avc: denied { create } for pid=8011 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.335512][ T37] audit: type=1400 audit(1575128763.480:45): avc: denied { write } for pid=8011 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.360078][ T37] audit: type=1400 audit(1575128763.480:46): avc: denied { read } for pid=8011 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 81.391631][ T8011] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.460640][ T8011] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.526099][ T8011] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.625843][ T8011] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.745067][ T8014] chnl_net:caif_netlink_parms(): no params data found [ 81.790394][ T8014] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.799534][ T8014] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.809715][ T8014] device bridge_slave_0 entered promiscuous mode [ 81.821560][ T8014] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.831207][ T8014] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.841572][ T8014] device bridge_slave_1 entered promiscuous mode [ 81.858433][ T8011] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.865988][ T8011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.873911][ T8011] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.881289][ T8011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.896891][ T8014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.908532][ T8014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.928354][ T8014] team0: Port device team_slave_0 added [ 81.936009][ T8014] team0: Port device team_slave_1 added [ 82.003908][ T8014] device hsr_slave_0 entered promiscuous mode [ 82.042235][ T8014] device hsr_slave_1 entered promiscuous mode [ 82.102087][ T8014] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.111620][ T1112] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.120118][ T1112] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.155213][ T8014] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.214421][ T8014] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.286410][ T8014] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.334806][ T8014] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.426345][ T8011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.440532][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.448807][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.460486][ T8011] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.473347][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.483723][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.491835][ T1112] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.499051][ T1112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.510455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.519208][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.527707][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.534752][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.547763][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.558676][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.573482][ T3044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.582322][ T3044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.592948][ T3044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.600446][ T3044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.609404][ T3044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.622012][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.630404][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.643919][ T8011] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.655204][ T8011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.663783][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.672275][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.694941][ T8014] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.704106][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.713283][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.729175][ T8011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.737237][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.745374][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.756721][ T8014] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.756811][ T37] audit: type=1400 audit(1575128764.930:47): avc: denied { associate } for pid=8011 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 82.773004][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.798124][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.807451][ T1112] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.815061][ T1112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.823535][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.832685][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.841357][ T1112] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.849050][ T1112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.856862][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.866186][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.875641][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.886192][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.895654][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.904372][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.915263][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.924316][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.928067][ T37] audit: type=1400 audit(1575128765.110:48): avc: denied { prog_load } for pid=8022 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 82.956827][ T37] audit: type=1400 audit(1575128765.130:49): avc: denied { prog_run } for pid=8022 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 82.960800][ T8014] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 82.990460][ T8014] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 83.005011][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4bea33f4afd6f90f9fb0d1254fb9f1a6fccbbebede3a6da9680839a55900617b3981b7d"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 83.032466][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.040719][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4bea33f4afd6f90f9fb0d1254fb9f1a6fccbbebede3a6da9680839a55900617b3981b7d"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 83.056329][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.064657][ T1112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.091209][ T8014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.099796][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.107396][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.201089][ T37] audit: type=1400 audit(1575128765.370:50): avc: denied { open } for pid=8034 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 83.225019][ T37] audit: type=1400 audit(1575128765.370:51): avc: denied { kernel } for pid=8034 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 83.253883][ T18] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 83.266370][ T18] hid-generic 0000:0000:0000.0002: hidraw1: HID v0.00 Device [syz1] on sz1 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 15:46:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12e) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) dup2(r1, r0) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 83.325388][ T2957] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 83.335758][ T2957] hid-generic 0000:0000:0000.0003: hidraw1: HID v0.00 Device [syz1] on sz1 15:46:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x29}], {0x95, 0x0, 0x0, 0x7a00}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xf54, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) pipe2(&(0x7f0000000100), 0xc4000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') getrandom(&(0x7f0000000200)=""/255, 0xff, 0x0) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, 0x0, &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x29}], {0x95, 0x0, 0x0, 0x7a00}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xf54, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) pipe2(&(0x7f0000000100), 0xc4000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') getrandom(&(0x7f0000000200)=""/255, 0xff, 0x0) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, 0x0, &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, 0x0, &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5820000000000000000a5ddf7", 0x10) recvfrom(r1, &(0x7f0000002240)=""/4106, 0xfffffffffffffd61, 0x0, 0x0, 0xfffffffffffffef2) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x29}], {0x95, 0x0, 0x0, 0x7a00}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xf54, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3f) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501886400de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x26, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x26, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x26, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x0, 0x3}, 0x20) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x39, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x39, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf4230002"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x39, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 83.914093][ C2] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 83.925383][ C2] Buffer I/O error on dev loop0, logical block 0, async page read [ 83.933776][ C3] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 83.944801][ C3] Buffer I/O error on dev loop0, logical block 0, async page read [ 83.953764][ C3] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 83.964520][ C3] Buffer I/O error on dev loop0, logical block 0, async page read [ 83.972756][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 83.983904][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 83.992548][ C1] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.003446][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.011628][ C1] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.022831][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.031063][ C1] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.042301][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.050535][ C3] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.061534][ C3] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.069604][ C3] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.080641][ C3] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.088959][ C0] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.099974][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 84.110215][ T8132] ldm_validate_partition_table(): Disk read failed. [ 84.118453][ T8132] Dev loop0: unable to read RDB block 0 [ 84.125005][ T8132] loop0: unable to read partition table [ 84.130734][ T8132] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 84.234984][ T8132] ldm_validate_partition_table(): Disk read failed. [ 84.243366][ T8132] Dev loop0: unable to read RDB block 0 [ 84.249697][ T8132] loop0: unable to read partition table [ 84.255780][ T8132] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x42, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 84.381124][ T8151] ldm_validate_partition_table(): Disk read failed. 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x47, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd5"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 84.389815][ T8151] Dev loop0: unable to read RDB block 0 [ 84.397884][ T8151] loop0: unable to read partition table [ 84.404293][ T8151] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x47, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x47, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 84.585677][ T8165] ldm_validate_partition_table(): Disk read failed. [ 84.593478][ T8165] Dev loop0: unable to read RDB block 0 [ 84.599745][ T8165] loop0: unable to read partition table [ 84.605688][ T8165] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 84.787177][ T8178] ldm_validate_partition_table(): Disk read failed. [ 84.795306][ T8178] Dev loop0: unable to read RDB block 0 [ 84.801541][ T8178] loop0: unable to read partition table [ 84.807586][ T8178] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4bea33f4afd6f90f9fb0d1254fb9f1a6fccbbebede3a6da9680839a55900617"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 85.535413][ T8274] ldm_validate_partition_table(): Disk read failed. [ 85.544500][ T8274] Dev loop0: unable to read RDB block 0 [ 85.552743][ T8274] loop0: unable to read partition table [ 85.559329][ T8274] loop_reread_partitions: partition scan of loop0 (i g!Ṅs؛R1z]=YҀSBۙyk #I") failed (rc=-5) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4bea33f4afd6f90f9fb0d1254fb9f1a6fccbbebede3a6da9680839a55900617b3981b7d"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 15:46:07 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000380)=ANY=[@ANYBLOB="b700000001ed0000bfa30000000000005500000000000000720af0fff8ffffff71a4f0ff000000003f000000000000005d400300000000006504000001ed000004000000000000006c44000000000000630a00fe000000000f04000000000000b7000000000000009500000000000000023bc065b7a36058bcd18c897f79d17cf9333379fc9e94af69912435f1b6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fee5bef70548aed0d600c095199fe3ff3128e599b0eaedbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f73cf25a97ffffffff658d42ecbf28c0a707255e3b834d66e3d43544bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70200000080da58fcd0e06dd31af9612f2460d0b110080739d81943445f533987ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f9f8ae6ec3541bdcc9aa58f24771c4b6a89adaf17b0a6041b8bc9eaf423000200000000000026a4040996e37c4f46756d31cb468ae8ade70063e5291569b33d21dae356e1c51f034c9263e089679216da18503ffa69162a27e50200004f3a10746443d64364f56e2464c794e7f2e6d2105bd90120617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4bea33f4afd6f90f9fb0d1254fb9f1a6fccbbebede3a6da9680839a55900617b3981b7d"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 15:46:07 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 0: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x25, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 15:46:07 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='z\xa6J\x1a\xf0Q>l\xee\x06\x01z`\x1e\xfe\x9a\xfc\xf7\xe7?]\x96J\xa0\x16\xcc\xc5\xcb\xf4\xdd\x1d0\xe5h%|\a\x1b\x14\x11,\xc4\x81\xdf\xc6\xb5E;\x7f\xe7\x17Q\xa48\x14=\xf870\xc4\x19_\xdfG\xad\xf6H\x1b\x90\x1eH\xe3\x87\r\xf5r\xd3d\xb28\xbe#\xdf\xac\x88\x88\x10d\f\x96\xe1\x86\xc0\xc9\xddA\x8dS\xbd\xc4_\x89\xd2\xf27\xea<\x83\xc8\xe9\x9dP\x00T\xefG\xd8\x80)\x89Gu\xfe\x978\xe0\xae\x12\x87\x95{4\xe5\n\bN[S\xfa1\xd5fFS\xe2\xe9\x8f\x14\x831q4\x7f\xb7\x02Pch\x92\xe6\xb6\xe5\x8fk\x91W2\x00\r\xd9S\x8c\x14\xc0/2\xf2\xca\xd1\xf1C\x18\x81\xf8\xacX\xe7\xc3_\x96x\xce2P\n\xc1\x1eZ\xd5\x95\xbc\x887z(\t\x92\x8ff\xe1\xdew\xdaE\xe1\xcd\xd1\xc1w\xef\xddn\xfd\x88v\x15\xc3!\xe3GG\ai\x12\xe0\xa1\xa3\xf5\x8akq\xb5\xff\x1f\xf8', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) 15:46:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x8, "1c69ab0d058b1b678397214eec9ff0d0cc8773ebb2cfd89b0252317a845d3df759d280ad530ff887d31ed8f9bf42b889fadb99a5defc79bd6b2023939c49224f", "e9af2deca424f1d69c3cef2acc10d15cae4da1bf9b1c974dd2de2185a2ae81bbcb58ebaa0b202596b0b84f59798e42bca13b7dd7218fcb5e75d1d7299ff17955", "804c0e6791e9da0c25402952a8dd77a5bf08050500"}) [ 85.790750][ C0] hrtimer: interrupt took 66701 ns [ 95.632983][ T8311] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 95.645947][ T8306] XFS (loop0): Mounting V4 Filesystem [ 95.692435][ T8306] ================================================================== [ 95.700594][ T8306] BUG: KASAN: use-after-free in xlog_alloc_log+0x1398/0x14b0 [ 95.706211][ T8306] Read of size 8 at addr ffff8880243dc890 by task syz-executor.0/8306 [ 95.715119][ T8306] [ 95.719875][ T8306] CPU: 2 PID: 8306 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 95.722177][ T8306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 95.735993][ T8306] Call Trace: [ 95.743818][ T8306] dump_stack+0x197/0x210 [ 95.743818][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 95.753939][ T8306] print_address_description.constprop.0.cold+0xd4/0x30b [ 95.758919][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 95.766602][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 95.772026][ T8306] __kasan_report.cold+0x1b/0x41 [ 95.777347][ T8306] ? kvmalloc_node+0x80/0x100 [ 95.782394][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 95.782394][ T8306] kasan_report+0x12/0x20 [ 95.790806][ T8306] __asan_report_load8_noabort+0x14/0x20 [ 95.793353][ T8306] xlog_alloc_log+0x1398/0x14b0 [ 95.803091][ T8306] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 95.809188][ T8306] xfs_log_mount+0xdc/0x780 [ 95.812161][ T8306] xfs_mountfs+0xdb9/0x1be0 [ 95.816912][ T8306] ? xfs_default_resblks+0x60/0x60 [ 95.823152][ T8306] ? init_timer_key+0x13b/0x3a0 [ 95.827939][ T8306] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 95.832149][ T8306] ? xfs_filestream_get_ag+0x60/0x60 [ 95.839414][ T8306] xfs_fs_fill_super+0xd24/0x1750 [ 95.843251][ T8306] mount_bdev+0x304/0x3c0 [ 95.843251][ T8306] ? xfs_test_remount_options+0x90/0x90 [ 95.853913][ T8306] xfs_fs_mount+0x35/0x40 [ 95.854659][ T8306] ? xfs_finish_flags+0x490/0x490 [ 95.863795][ T8306] legacy_get_tree+0x108/0x220 [ 95.863795][ T8306] vfs_get_tree+0x8e/0x300 [ 95.872028][ T8306] do_mount+0x135a/0x1b50 [ 95.873884][ T8306] ? copy_mount_string+0x40/0x40 [ 95.882078][ T8306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.887330][ T8306] ? copy_mount_options+0x2e8/0x3f0 [ 95.892079][ T8306] ksys_mount+0xdb/0x150 [ 95.897424][ T8306] __x64_sys_mount+0xbe/0x150 [ 95.902275][ T8306] do_syscall_64+0xfa/0x790 [ 95.902275][ T8306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 95.913094][ T8306] RIP: 0033:0x45b87a [ 95.913094][ T8306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 8d a0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6a a0 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 95.932041][ T8306] RSP: 002b:00007f6bf379ca98 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 95.943141][ T8306] RAX: ffffffffffffffda RBX: 00007f6bf379cb10 RCX: 000000000045b87a [ 95.952070][ T8306] RDX: 00007f6bf379caf0 RSI: 00000000200000c0 RDI: 00007f6bf379cb10 [ 95.952070][ T8306] RBP: 00007f6bf379caf0 R08: 00007f6bf379cb50 R09: 00007f6bf379caf0 [ 95.962105][ T8306] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f6bf379cb50 [ 95.973107][ T8306] R13: 00000000004b2e20 R14: 00000000006f62c8 R15: 00000000ffffffff [ 95.982243][ T8306] [ 95.982243][ T8306] Allocated by task 8306: [ 95.982243][ T8306] save_stack+0x23/0x90 [ 95.993148][ T8306] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 95.993148][ T8306] kasan_kmalloc+0x9/0x10 [ 96.002078][ T8306] __kmalloc+0x163/0x770 [ 96.002078][ T8306] kmem_alloc+0x15b/0x4d0 [ 96.013156][ T8306] xlog_alloc_log+0xcce/0x14b0 [ 96.013156][ T8306] xfs_log_mount+0xdc/0x780 [ 96.022069][ T8306] xfs_mountfs+0xdb9/0x1be0 [ 96.022069][ T8306] xfs_fs_fill_super+0xd24/0x1750 [ 96.028297][ T8306] mount_bdev+0x304/0x3c0 [ 96.028297][ T8306] xfs_fs_mount+0x35/0x40 [ 96.028297][ T8306] legacy_get_tree+0x108/0x220 [ 96.044280][ T8306] vfs_get_tree+0x8e/0x300 [ 96.044280][ T8306] do_mount+0x135a/0x1b50 [ 96.052379][ T8306] ksys_mount+0xdb/0x150 [ 96.052379][ T8306] __x64_sys_mount+0xbe/0x150 [ 96.062006][ T8306] do_syscall_64+0xfa/0x790 [ 96.062116][ T8306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 96.072009][ T8306] [ 96.073133][ T8306] Freed by task 8306: [ 96.073133][ T8306] save_stack+0x23/0x90 [ 96.082151][ T8306] __kasan_slab_free+0x102/0x150 [ 96.082151][ T8306] kasan_slab_free+0xe/0x10 [ 96.082151][ T8306] kfree+0x10a/0x2c0 [ 96.091994][ T8306] kvfree+0x61/0x70 [ 96.091994][ T8306] xlog_alloc_log+0xeb5/0x14b0 [ 96.103192][ T8306] xfs_log_mount+0xdc/0x780 [ 96.103192][ T8306] xfs_mountfs+0xdb9/0x1be0 [ 96.112084][ T8306] xfs_fs_fill_super+0xd24/0x1750 [ 96.112171][ T8306] mount_bdev+0x304/0x3c0 [ 96.112171][ T8306] xfs_fs_mount+0x35/0x40 [ 96.122099][ T8306] legacy_get_tree+0x108/0x220 [ 96.122099][ T8306] vfs_get_tree+0x8e/0x300 [ 96.133165][ T8306] do_mount+0x135a/0x1b50 [ 96.133165][ T8306] ksys_mount+0xdb/0x150 [ 96.142150][ T8306] __x64_sys_mount+0xbe/0x150 [ 96.142150][ T8306] do_syscall_64+0xfa/0x790 [ 96.153126][ T8306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 96.153126][ T8306] [ 96.162056][ T8306] The buggy address belongs to the object at ffff8880243dc800 [ 96.162056][ T8306] which belongs to the cache kmalloc-1k of size 1024 [ 96.173109][ T8306] The buggy address is located 144 bytes inside of [ 96.173109][ T8306] 1024-byte region [ffff8880243dc800, ffff8880243dcc00) [ 96.182088][ T8306] The buggy address belongs to the page: [ 96.193141][ T8306] page:ffffea000090f700 refcount:1 mapcount:0 mapping:ffff88802cc00c40 index:0x0 [ 96.202042][ T8306] raw: 00fffe0000000200 ffffea0000aaad88 ffffea0000950388 ffff88802cc00c40 [ 96.212046][ T8306] raw: 0000000000000000 ffff8880243dc000 0000000100000002 0000000000000000 [ 96.214658][ T8306] page dumped because: kasan: bad access detected [ 96.222049][ T8306] [ 96.222049][ T8306] Memory state around the buggy address: [ 96.233089][ T8306] ffff8880243dc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 96.242224][ T8306] ffff8880243dc800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 96.242224][ T8306] >ffff8880243dc880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 96.251985][ T8306] ^ [ 96.263093][ T8306] ffff8880243dc900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 96.271976][ T8306] ffff8880243dc980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 96.272679][ T8306] ================================================================== [ 96.283161][ T8306] Disabling lock debugging due to kernel taint [ 96.295632][ T8306] Kernel panic - not syncing: panic_on_warn set ... [ 96.302087][ T8306] CPU: 0 PID: 8306 Comm: syz-executor.0 Tainted: G B 5.4.0-syzkaller #0 [ 96.304627][ T8306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 96.304627][ T8306] Call Trace: [ 96.304627][ T8306] dump_stack+0x197/0x210 [ 96.304627][ T8306] panic+0x2e3/0x75c [ 96.304627][ T8306] ? add_taint.cold+0x16/0x16 [ 96.304627][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 96.304627][ T8306] ? preempt_schedule+0x4b/0x60 [ 96.304627][ T8306] ? ___preempt_schedule+0x16/0x18 [ 96.304627][ T8306] ? trace_hardirqs_on+0x5e/0x240 [ 96.304627][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 96.304627][ T8306] end_report+0x47/0x4f [ 96.304627][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 96.304627][ T8306] __kasan_report.cold+0xe/0x41 [ 96.304627][ T8306] ? kvmalloc_node+0x80/0x100 [ 96.304627][ T8306] ? xlog_alloc_log+0x1398/0x14b0 [ 96.304627][ T8306] kasan_report+0x12/0x20 [ 96.304627][ T8306] __asan_report_load8_noabort+0x14/0x20 [ 96.304627][ T8306] xlog_alloc_log+0x1398/0x14b0 [ 96.304627][ T8306] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 96.304627][ T8306] xfs_log_mount+0xdc/0x780 [ 96.304627][ T8306] xfs_mountfs+0xdb9/0x1be0 [ 96.304627][ T8306] ? xfs_default_resblks+0x60/0x60 [ 96.304627][ T8306] ? init_timer_key+0x13b/0x3a0 [ 96.304627][ T8306] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 96.304627][ T8306] ? xfs_filestream_get_ag+0x60/0x60 [ 96.304627][ T8306] xfs_fs_fill_super+0xd24/0x1750 [ 96.304627][ T8306] mount_bdev+0x304/0x3c0 [ 96.304627][ T8306] ? xfs_test_remount_options+0x90/0x90 [ 96.304627][ T8306] xfs_fs_mount+0x35/0x40 [ 96.304627][ T8306] ? xfs_finish_flags+0x490/0x490 [ 96.304627][ T8306] legacy_get_tree+0x108/0x220 [ 96.304627][ T8306] vfs_get_tree+0x8e/0x300 [ 96.304627][ T8306] do_mount+0x135a/0x1b50 [ 96.304627][ T8306] ? copy_mount_string+0x40/0x40 [ 96.304627][ T8306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 96.304627][ T8306] ? copy_mount_options+0x2e8/0x3f0 [ 96.304627][ T8306] ksys_mount+0xdb/0x150 [ 96.304627][ T8306] __x64_sys_mount+0xbe/0x150 [ 96.304627][ T8306] do_syscall_64+0xfa/0x790 [ 96.304627][ T8306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 96.304627][ T8306] RIP: 0033:0x45b87a [ 96.304627][ T8306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 8d a0 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6a a0 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 96.304627][ T8306] RSP: 002b:00007f6bf379ca98 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 96.304627][ T8306] RAX: ffffffffffffffda RBX: 00007f6bf379cb10 RCX: 000000000045b87a [ 96.304627][ T8306] RDX: 00007f6bf379caf0 RSI: 00000000200000c0 RDI: 00007f6bf379cb10 [ 96.304627][ T8306] RBP: 00007f6bf379caf0 R08: 00007f6bf379cb50 R09: 00007f6bf379caf0 [ 96.304627][ T8306] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f6bf379cb50 [ 96.304627][ T8306] R13: 00000000004b2e20 R14: 00000000006f62c8 R15: 00000000ffffffff [ 96.304627][ T8306] Kernel Offset: disabled [ 96.304627][ T8306] Rebooting in 86400 seconds..