[ 45.350643][ T27] audit: type=1800 audit(1584959700.482:29): pid=8304 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. 2020/03/23 10:35:08 fuzzer started 2020/03/23 10:35:10 dialing manager at 10.128.0.26:37349 2020/03/23 10:35:10 syscalls: 2999 2020/03/23 10:35:10 code coverage: enabled 2020/03/23 10:35:10 comparison tracing: enabled 2020/03/23 10:35:10 extra coverage: enabled 2020/03/23 10:35:10 setuid sandbox: enabled 2020/03/23 10:35:10 namespace sandbox: enabled 2020/03/23 10:35:10 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/23 10:35:10 fault injection: enabled 2020/03/23 10:35:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/23 10:35:10 net packet injection: enabled 2020/03/23 10:35:10 net device setup: enabled 2020/03/23 10:35:10 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/23 10:35:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:36:37 executing program 0: 10:36:37 executing program 1: syzkaller login: [ 142.677671][ T8470] IPVS: ftp: loaded support on port[0] = 21 10:36:38 executing program 2: [ 142.837257][ T8470] chnl_net:caif_netlink_parms(): no params data found [ 142.862583][ T8472] IPVS: ftp: loaded support on port[0] = 21 [ 142.940900][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.958800][ T8470] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.981978][ T8470] device bridge_slave_0 entered promiscuous mode [ 142.996103][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.004175][ T8470] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.012107][ T8470] device bridge_slave_1 entered promiscuous mode [ 143.036586][ T8470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 143.049372][ T8470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.073555][ T8470] team0: Port device team_slave_0 added [ 143.095809][ T8470] team0: Port device team_slave_1 added [ 143.130611][ T8478] IPVS: ftp: loaded support on port[0] = 21 [ 143.147161][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 143.154945][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.181181][ T8470] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 10:36:38 executing program 3: [ 143.194720][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 143.201936][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 143.261815][ T8470] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:36:38 executing program 4: [ 143.434710][ T8470] device hsr_slave_0 entered promiscuous mode [ 143.512131][ T8470] device hsr_slave_1 entered promiscuous mode [ 143.572945][ T8482] IPVS: ftp: loaded support on port[0] = 21 [ 143.603576][ T8472] chnl_net:caif_netlink_parms(): no params data found [ 143.615176][ T8484] IPVS: ftp: loaded support on port[0] = 21 10:36:38 executing program 5: [ 143.823547][ T8472] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.832704][ T8472] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.840535][ T8472] device bridge_slave_0 entered promiscuous mode [ 143.870368][ T8478] chnl_net:caif_netlink_parms(): no params data found [ 143.880057][ T8472] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.887305][ T8472] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.895328][ T8472] device bridge_slave_1 entered promiscuous mode [ 143.912860][ T8472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 143.924617][ T8472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.961919][ T8490] IPVS: ftp: loaded support on port[0] = 21 [ 143.988604][ T8472] team0: Port device team_slave_0 added [ 143.999312][ T8472] team0: Port device team_slave_1 added [ 144.064984][ T8470] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 144.124561][ T8472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 144.131636][ T8472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 144.157608][ T8472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 144.186371][ T8470] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 144.253481][ T8472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 144.260433][ T8472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 144.286583][ T8472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 144.306070][ T8484] chnl_net:caif_netlink_parms(): no params data found [ 144.318484][ T8470] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 144.364797][ T8470] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 144.423133][ T8482] chnl_net:caif_netlink_parms(): no params data found [ 144.446302][ T8478] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.453567][ T8478] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.461150][ T8478] device bridge_slave_0 entered promiscuous mode [ 144.470876][ T8478] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.478131][ T8478] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.485839][ T8478] device bridge_slave_1 entered promiscuous mode [ 144.553736][ T8472] device hsr_slave_0 entered promiscuous mode [ 144.603452][ T8472] device hsr_slave_1 entered promiscuous mode [ 144.641260][ T8472] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.648986][ T8472] Cannot create hsr debugfs directory [ 144.707136][ T8478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 144.743986][ T8478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 144.805034][ T8478] team0: Port device team_slave_0 added [ 144.837731][ T8482] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.845011][ T8482] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.853066][ T8482] device bridge_slave_0 entered promiscuous mode [ 144.865449][ T8482] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.872754][ T8482] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.880379][ T8482] device bridge_slave_1 entered promiscuous mode [ 144.899350][ T8478] team0: Port device team_slave_1 added [ 144.914801][ T8484] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.921964][ T8484] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.929489][ T8484] device bridge_slave_0 entered promiscuous mode [ 144.938010][ T8482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 144.964233][ T8484] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.972087][ T8484] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.979624][ T8484] device bridge_slave_1 entered promiscuous mode [ 144.987735][ T8482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.006595][ T8490] chnl_net:caif_netlink_parms(): no params data found [ 145.040233][ T8478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 145.047880][ T8478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.073846][ T8478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 145.089360][ T8478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 145.096364][ T8478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.122564][ T8478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 145.139527][ T8482] team0: Port device team_slave_0 added [ 145.148752][ T8482] team0: Port device team_slave_1 added [ 145.156398][ T8484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 145.193398][ T8484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.214997][ T8484] team0: Port device team_slave_0 added [ 145.263435][ T8484] team0: Port device team_slave_1 added [ 145.278037][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 145.286758][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.312930][ T8482] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 145.372669][ T8478] device hsr_slave_0 entered promiscuous mode [ 145.411254][ T8478] device hsr_slave_1 entered promiscuous mode [ 145.451088][ T8478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 145.458649][ T8478] Cannot create hsr debugfs directory [ 145.480781][ T8490] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.487954][ T8490] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.495922][ T8490] device bridge_slave_0 entered promiscuous mode [ 145.506028][ T8482] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 145.513250][ T8482] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.539503][ T8482] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 145.566374][ T8490] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.573583][ T8490] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.581604][ T8490] device bridge_slave_1 entered promiscuous mode [ 145.630103][ T8484] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 145.637244][ T8484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.663307][ T8484] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 145.722666][ T8482] device hsr_slave_0 entered promiscuous mode [ 145.773807][ T8482] device hsr_slave_1 entered promiscuous mode [ 145.811138][ T8482] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 145.818692][ T8482] Cannot create hsr debugfs directory [ 145.842874][ T8484] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 145.849816][ T8484] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.875836][ T8484] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 145.912017][ T8490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 145.925651][ T8490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.962674][ T8484] device hsr_slave_0 entered promiscuous mode [ 146.001255][ T8484] device hsr_slave_1 entered promiscuous mode [ 146.051311][ T8484] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 146.058866][ T8484] Cannot create hsr debugfs directory [ 146.066272][ T8470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.078014][ T8472] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 146.158053][ T8472] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 146.223985][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.232569][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.247198][ T8470] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.256686][ T8472] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 146.304266][ T8490] team0: Port device team_slave_0 added [ 146.310112][ T8472] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 146.385380][ T8490] team0: Port device team_slave_1 added [ 146.407050][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 146.414119][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.440258][ T8490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 146.457307][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.466497][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.475108][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.482305][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.490947][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.504444][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 146.513192][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.540396][ T8490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 146.572144][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.580691][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.589251][ T2723] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.596343][ T2723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.652843][ T8490] device hsr_slave_0 entered promiscuous mode [ 146.691420][ T8490] device hsr_slave_1 entered promiscuous mode [ 146.731368][ T8490] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 146.738990][ T8490] Cannot create hsr debugfs directory [ 146.782069][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.812058][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.832569][ T8478] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 146.864808][ T8478] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 146.930449][ T8478] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 146.993345][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.002633][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.031466][ T8478] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 147.064437][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.072591][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.081462][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.089673][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.098013][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.117529][ T8482] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 147.173823][ T8482] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 147.226789][ T8482] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 147.286785][ T8482] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 147.361699][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.369903][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.394171][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.427020][ T8484] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 147.490324][ T8484] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 147.537311][ T8484] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 147.614483][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 147.621936][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 147.635417][ T8470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.644548][ T8490] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 147.703402][ T8490] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 147.744147][ T8490] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 147.814663][ T8484] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 147.887729][ T8490] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 147.961919][ T8472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.003117][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.012539][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.035835][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.046840][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.062901][ T8472] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.082712][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.090709][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.099166][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.107156][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.137098][ T8470] device veth0_vlan entered promiscuous mode [ 148.146456][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.155225][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.166883][ T2706] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.173998][ T2706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.190982][ T8478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.213187][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.220999][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.229641][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.238269][ T2719] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.245353][ T2719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.253475][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.262120][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.270481][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.278905][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.293669][ T8470] device veth1_vlan entered promiscuous mode [ 148.303423][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 148.311373][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.327766][ T8478] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.344558][ T8482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.363659][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 148.372220][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.380553][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.389162][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.397465][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.405079][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.413899][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.426595][ T8472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.439147][ T8472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.455750][ T8490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.464388][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.473182][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.481853][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.490307][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.498745][ T2706] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.505809][ T2706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.514372][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.537408][ T8484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.560881][ T8482] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.568607][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.576586][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.585414][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.594121][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.602463][ T2719] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.609498][ T2719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.617088][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.635219][ T8484] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.648536][ T8472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.663044][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.673010][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.682183][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.690334][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.703492][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.711415][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.720690][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.729459][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 148.737157][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 148.745414][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.766946][ T8490] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.780461][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.792283][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.800470][ T2723] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.807520][ T2723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.818032][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.826835][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.838057][ T2723] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.845136][ T2723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.853097][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.861725][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.869951][ T2723] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.877070][ T2723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.884706][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.893600][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.902002][ T2723] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.909068][ T2723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.916656][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.924380][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.932191][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.940565][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.949075][ T2723] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.956167][ T2723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.967909][ T8470] device veth0_macvtap entered promiscuous mode [ 148.983406][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 148.996326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.006156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.014620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.022818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.031948][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.040133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.048974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.061549][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.088544][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.097150][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.106613][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.115179][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.124013][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.132515][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.140792][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.151235][ T8470] device veth1_macvtap entered promiscuous mode [ 149.175430][ T8478] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 149.186051][ T8478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.205743][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.214935][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.225273][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.235324][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.244447][ T2719] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.251567][ T2719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.259555][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.268286][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.277466][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.285691][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.294281][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.306407][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.314887][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.323723][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.337162][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 149.353048][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.360803][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.369818][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.378537][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.387621][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.397305][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.405643][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.414172][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.423384][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.446302][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.455575][ T8472] device veth0_vlan entered promiscuous mode [ 149.463440][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.474457][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.483487][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.494264][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.503727][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.513843][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 149.522693][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 149.530109][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.540776][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.567948][ T8478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.579002][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 149.594574][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.604844][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.613770][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.622345][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.630482][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.638861][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.647163][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.655301][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.663983][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.673807][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.693711][ T8472] device veth1_vlan entered promiscuous mode [ 149.730448][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.738883][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.761111][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 149.768521][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 149.779556][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.788471][ T2714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.867753][ T8484] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.881749][ T8484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.904011][ T8490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.916414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.926191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.939300][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.947636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.956614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.964379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.983322][ T8482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.992916][ T8478] device veth0_vlan entered promiscuous mode [ 150.002028][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 150.009520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 150.120884][ T8478] device veth1_vlan entered promiscuous mode [ 150.142403][ T8472] device veth0_macvtap entered promiscuous mode [ 150.167799][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 150.176833][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.185764][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.195758][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 150.203482][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 150.211811][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 150.225558][ T8484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.236112][ T8472] device veth1_macvtap entered promiscuous mode [ 150.277325][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 150.297185][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 10:36:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @adiantum, 0x4, "a90b34fe8c179e93"}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000002340)=""/203) socket$rxrpc(0x21, 0x2, 0x2) kexec_load(0x3, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000080)="9ec75c11fb79eed0a7d403e9542dbe0eb898af3d92bd1b0c2620a60bb7f0e02358c30f7550b4db6ac8acb0ea0c5bde40e35d18e57baf7efc65534ea2287f582ae59de9583bd2c15b66463b83e8416c7e6100999134d1497434a5b40f5ced4a556dc7758f24bcd107bceed50b33c9f45df5fcfe5938da3b3480718e934a594ee56a85d1481c06e9a1cef4cccfbaff02f34fa4b900dbeead2fb3e77af9ac175e8d937ef1d95e1df9d01faae697fe3a43cf", 0xb0, 0x0, 0x87dc}, {&(0x7f0000000140)="55fb055bacd94181c4331f58c7edde35cb29b7732a49dc6f760acef239ce9ac683e7c47c1891d5d2e2f5f9acbbc7dd48c8491b567740c84dbf111750ac30395c557a143fd7d5c43b00ca099483c5519d8c4400466cfa648095c21292411adb4e0349d924137776dbdb8b99", 0x6b, 0x80000000, 0x7}, {&(0x7f00000001c0)="985ff13836a8f48a4a4d456ec093c917a70a2c8bbf7d0337cb0d48f8e804b2c4da81256951b53485c2d1a4332e87a8db3c9b3b352bf6bc9159017259eac543cf67ae080ff43a35003cf336c2ade7d490b1b3021b9239948560d173e5a2c41a3b21bf3c563733e80feb8e17418bdc1a9006d749bc0d76430f4d2e1b899863d34abf79fe391e256e8508342b871ba06d40cb9cb63975794221eaba84a51bb504575affff378e9d374850f04407d57ea6bbc0be693a542296d98194a6444d33e228dc8f", 0xc2, 0x7fffffff, 0x4}, {&(0x7f00000002c0)="601f8fc28269a36f5679b40e4962d84c5acf3125454aa69f4bd3931262ee3b93c4211b6d3f23c429b2ba86b4206911f05e6dfb951f1410cac125778fcc7c55ffc8f7f85f2c728738d487ae8308ce52b4d693695af361f3826cae840ebd7f73423d5b80e1c6eca3b5015d4147ed1cd6dfe91c11e7aa9fa1ae97145ff31b501875e4", 0x81, 0x8, 0x7b}, {&(0x7f0000000380)="91bf6afebbcc21758576a167fac03e789f", 0x11, 0x100, 0x3f}, {&(0x7f00000003c0)="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", 0xfa, 0x100000000, 0x2}, {&(0x7f00000004c0)="1e38632affe2b74fd58c1a9bef6e8f71f1259c890fbd4444a1e956bfb1c7e16c94868e55c458bd82195428f8ff542e91", 0x30, 0x80000001, 0x10000}], 0x150000) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0xc02) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000500)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r3 = dup(r2) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) fchdir(r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000680)=@assoc_id=0x0, &(0x7f00000006c0)=0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000700)={r6, @in={{0x2, 0x4e22, @remote}}, 0x6, 0x0, 0x3, 0x80000000, 0x2, 0x6, 0x20}, 0x9c) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) [ 150.322405][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.332280][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.409298][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.421595][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.433803][ T8472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 150.441979][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.450279][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.463689][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.474120][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.483758][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.493672][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.502860][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.511314][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.521778][ T8478] device veth0_macvtap entered promiscuous mode [ 150.534057][ T8482] device veth0_vlan entered promiscuous mode [ 150.550806][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.561367][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.574184][ T8472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 150.582949][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 150.590768][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.599755][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 10:36:45 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/schedstat\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d4062"], 0x4) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2c02) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 150.607513][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.616165][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.625578][ T8478] device veth1_macvtap entered promiscuous mode [ 150.637254][ T8490] device veth0_vlan entered promiscuous mode 10:36:45 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302ed175d908c9205ed3b71ea13952fe4cbe6fe94815d4296f6e66de94f42cfa66862535188bc73114cc5b7e45adbc96ada2c96fcdf56ac7d8c5df0d6217f049413454c471de840cdf462e7b21af76c2dd85cfd2af275132f78a7a2a406f4f2c848cfe3e120ea0124ee07fabe1ab30355d1da3792ed03734c9d2311b8c492141e49bbd12988425f3e6416d98397d0c772f66625b0984a41111e8655de4c87c3ffc5a612004b19158174c2f52680b3bf2e418bc4e9b4a0b873e7f6926102d5cc7e6eebb2a8407b684607e441ca52eabfeca040254d87b627de25f8e6899de161d199468"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000000180)=0xffff, &(0x7f00000001c0)=0x4) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$NBD_SET_TIMEOUT(r7, 0xab09, 0x0) [ 150.715244][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.731768][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.740187][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.766570][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.776141][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.783812][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.796778][ T8490] device veth1_vlan entered promiscuous mode [ 150.812145][ T8478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.822785][ T8478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.833260][ T8478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.844286][ T8478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.845679][ T8478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 150.847935][ T8482] device veth1_vlan entered promiscuous mode [ 150.935202][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 150.943517][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.955402][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.966638][ T8478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:36:46 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000002840)={0x8, 0x9, 0x4, 0x20, 0x10000, {}, {0x1, 0xc, 0x5, 0x59, 0x5, 0x8, "fd9dc616"}, 0x8, 0x3, @planes=&(0x7f0000002800)={0x1000, 0x400, @userptr=0x4, 0x80000001}, 0xdae, 0x0, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f00000028c0)={@fixed={[], 0x10}, 0xfffffffb, 0x0, 0x3}) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 150.977933][ T8478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.988121][ T8478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.999280][ T8478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.010190][ T8478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 151.087333][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 151.095534][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.104491][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.157331][ T8537] device vxlan0 entered promiscuous mode [ 151.239206][ T8482] device veth0_macvtap entered promiscuous mode [ 151.250105][ T8482] device veth1_macvtap entered promiscuous mode 10:36:46 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x6, 0x801}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) [ 151.289061][ T8484] device veth0_vlan entered promiscuous mode [ 151.376226][ T8490] device veth0_macvtap entered promiscuous mode [ 151.390949][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.407714][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.417809][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.428825][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.438828][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 151.449314][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.460833][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 151.469050][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 151.485789][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.494341][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.502489][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 151.510741][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.519161][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 151.527438][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.535739][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 151.544103][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.558659][ T8490] device veth1_macvtap entered promiscuous mode [ 151.571107][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.589023][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.600115][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:36:46 executing program 2: memfd_create(&(0x7f0000000440)='Kwlan1ke\xb9\xa9\xd0IN\x99\xe8\xce\xd5\x1d\x03`\fWbing', 0x1) sched_setscheduler(0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r2, r0, 0x0, 0x17, &(0x7f00000000c0)='n\xd3\xcd0\xdf\xfaJ\x87\"[\xfcet/fib_trie\x00', 0xffffffffffffffff}, 0x30) clone3(&(0x7f0000000380)={0x10600e200, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), {0x2d}, &(0x7f0000000200)=""/85, 0x55, &(0x7f0000000280)=""/151, &(0x7f0000000340)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x50) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400)={0x0, 0xb97}, 0x8) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) [ 151.629761][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 151.648285][ T8482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 151.661250][ T8482] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:36:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x2) readahead(r0, 0x800, 0x401) request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3, 0x74}, &(0x7f00000000c0)='\x00vwx\n!p\xdd7\xb8\rS\x12\xe5\xec\xc1\xd5\x95bBS\xd9\x97\xdf\xdd\x05\xf8Q5\x1c\x9f\xcc\xf0\x86ax\x86B\x194\x04', 0x0) 10:36:46 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB='0'], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0xc9095ba04274a951) sendmmsg$inet6(r5, &(0x7f0000000ec0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r7}}}, @rthdr_2292={{0x18}}], 0x40}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000540)={0x28, 0x0, 0xffffffff}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r9, 0x10, &(0x7f0000000300)={&(0x7f0000000380)=""/188, 0xbc, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xc, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x2, 0x6, 0x9, 0x4, 0x6, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x0, 0x3, 0x0, 0xa, 0xffffffffffffffe0}, @call={0x85, 0x0, 0x0, 0x5f}, @func, @map={0x18, 0x3, 0x1, 0x0, r2}, @map={0x18, 0x6, 0x1, 0x0, r4}, @generic={0x7b, 0x6, 0xc, 0x401, 0x4}, @alu={0x4, 0x0, 0x1, 0x0, 0x8, 0x0, 0x8}], &(0x7f00000000c0)='GPL\x00', 0xffff0001, 0xba, &(0x7f0000000100)=""/186, 0x41000, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x3, 0x1f, 0x1}, 0x10, r10}, 0x78) [ 151.678652][ T8482] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 151.700147][ T8543] device vxlan0 entered promiscuous mode [ 151.873428][ T8484] device veth1_vlan entered promiscuous mode [ 151.882349][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 151.890333][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 151.898448][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.906476][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.914158][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 10:36:47 executing program 2: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f07, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b3b3a3a5d2c303a3a363a00d880f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d1be5002be7e6c4952fcf88956152cfc00b74473a06025b5a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 151.921930][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 151.929758][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 151.938238][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.007136][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.024520][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.029325][ T8562] libceph: resolve ';' (ret=-3): failed [ 152.034850][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.034856][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.034864][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.034869][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.034876][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.034880][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.036132][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.043583][ T8562] libceph: Failed to parse monitor IPs: -3 [ 152.122002][ T8562] libceph: resolve ';' (ret=-3): failed [ 152.127884][ T8562] libceph: Failed to parse monitor IPs: -3 [ 152.180528][ T8484] device veth0_macvtap entered promiscuous mode [ 152.200057][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.225414][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.234159][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.245724][ T2713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.256423][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.277945][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.287989][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.298665][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.313426][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.326221][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.337487][ T8490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.349431][ T8490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.363716][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 152.432181][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 152.440223][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.452522][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.475381][ T8484] device veth1_macvtap entered promiscuous mode 10:36:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x48, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x34, 0x1, [@m_ctinfo={0x30, 0x3ffd, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x0, 0x0, 0x20000000}}]}, {0x4}}}]}]}, 0x48}}, 0x0) [ 152.611255][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.622806][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.635087][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.645580][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.655414][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.665855][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.676923][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.687732][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.697632][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.708509][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.720364][ T8484] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.773297][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.785090][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.796107][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.807538][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.824481][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.836026][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.846547][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.856404][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.867023][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.877018][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.887435][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.897478][ T8484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.908208][ T8484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.920101][ T8484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 152.931299][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.939765][ T2706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:36:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, &(0x7f0000000340), 0x0, 0x0) 10:36:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x10000, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x202000, 0x0) 10:36:48 executing program 2: r0 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockname$l2tp6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x20) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x9a3, 0x3f, &(0x7f0000000200), 0x12001, 0x0) 10:36:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0xc9095ba04274a951) sendmmsg$inet6(r0, &(0x7f0000000ec0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r2}}}, @rthdr_2292={{0x18}}], 0x40}}], 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@ipv4_newroute={0x10c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x8, 0x16, 0x0, 0x1, @nested={0x4}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_GATEWAY={0x8, 0x5, @remote}, @RTA_MULTIPATH={0xc, 0x9, {0xfff, 0x4, 0x3, r2}}, @RTA_IIF={0x8, 0x3, r2}, @RTA_PRIORITY={0x8, 0x6, 0x1}, @RTA_METRICS={0xbc, 0x8, 0x0, 0x1, "be4967a9da8adb061ed8f7b8438c8ab00edaafb4cd93b484d74a8c4a4907c1d66230dd1632e7d8afe4aa9b6e1dfb59c4bfdb630e9e5ea646f62bede7d89bb39bb5a2a469f39827634b42ec4bac6eaed5e6105216dbc41b2757c77958e5bba4cf4a84ff90bc5d248b516ed9f856e8cdf32507ccb25d87d45cc3c39111f00169befce45db295cfc1040c599e082333d2c87ed36f4dc8a6be7f04c67e20a5fd69371cf6519cd60015a68714be004f071fcfecffa25c2eef0c4d"}]}, 0x10c}}, 0x0) r3 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000500)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0xcc, r6, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_EXT_CAPABILITY={0xb0, 0xac, "37033b40edbca20af18524e4378f2a323b94b95361afb34a053d00b6e27eeb3343bd100b4d2d010a7ffbb39449ed9d5e1d09392745edbb9175b77f8c66b966f8b541f8102abbdda0e0dba02970fd2aef9301b2e85d667fddf677c8ae8a2bfb1d716673b77d4f7a2a9ba295b21c670c1aab8e673ea787aa94d4ecf4995fb488fe103bb30d4ab1d36d709611a17e6ed218485cef2f59c5fae22d42ef73610c96ecc655f10cbbca7a0342af5fc6"}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x80}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000}, 0x40d4) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 10:36:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000100)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0xffffffffffff0700}}]}) 10:36:48 executing program 5: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffdfb, &(0x7f0000000080)=[{&(0x7f0000000040)="0a48000036000535d25a80648c63940d0224fc60100009400a000000053582c137153e370935018000f01700d1bd", 0x2e}], 0x1}, 0x8011) 10:36:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x10000, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x202000, 0x0) 10:36:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='net/ip_mr_cache\x00') pread64(r0, 0x0, 0x0, 0x0) r1 = socket(0x1a, 0x0, 0xfffffffc) sendfile(r1, r0, &(0x7f0000000000)=0x9e, 0xddf5) 10:36:48 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="23000000190081ae08060c04000f00000a007f03fe0200018701546fabca1b4e7d06a6", 0x23}], 0x1}, 0x0) 10:36:48 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x181200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdba, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@fragment, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x2}}, 0x20) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) 10:36:48 executing program 5: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl(r4, 0x890e, &(0x7f0000000200)="080db5055e0bcfe8336341d924ff8b6426e9020147a071c650161e91aa7bd94da769c6f9de2ba1b83e9a238ab2c84dc169e5aacbea150db63783eeebbd917b28ae67a00266513e1611dea8633a5fc5448c2bfb70a847f1cc6eaaed4c5b8a1980166b1533eb03c7a4a0858edd6f6c6c4fe4176ef9cfe6c985fa7f4d0f568d49fda572b5145d8bd4f54ec1a2853244b3fdda1f2a") r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r1, 0x0, 0x100000001) [ 153.437474][ T8597] XFS (loop4): Invalid superblock magic number 10:36:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000016c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in=@loopback}, {@in=@empty, 0x0, 0x3c}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha512-arm64\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000080)=""/66) [ 153.748990][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 153.749000][ T27] audit: type=1804 audit(1584959808.882:31): pid=8636 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir069031249/syzkaller.8px5w8/3/cgroup.controllers" dev="sda1" ino=16544 res=1 10:36:49 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6c6f21cd726469723d2e2f6c65312c757070657264696837d4aea35c5f68b6cf715ecda40f00002e2f66696c65300000003ac27f1bc457f4"]) chdir(&(0x7f0000000140)='./bus\x00') r3 = open(&(0x7f0000002000)='./bus\x00', 0x8a940, 0x0) readahead(r3, 0x0, 0x0) 10:36:49 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000200)={@broadcast, @random="cd0c2e007131", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3c, 0x0, @local, @mcast2, {[@hopopts={0x88}], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "c5ddf6", 0x0, 0x0, 0x0, @mcast2, @dev={0xfe, 0x80, [], 0x37}}}}}}}}, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000fe9000/0x3000)=nil) shmat(r0, &(0x7f0000fea000/0x3000)=nil, 0x5000) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f0000000000)=""/176) 10:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000280)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x74, 0x4, 0x8, 0x801, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8808}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x21e8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x61a}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xfbfb}]}, 0x74}, 0x1, 0x0, 0x0, 0x44000010}, 0x48001) 10:36:49 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008000100000001"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="c9ae00001a", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000841) 10:36:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/116) write$binfmt_script(r0, &(0x7f0000001380)=ANY=[@ANYRESHEX=0x0], 0x12) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r5, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r5, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 10:36:49 executing program 2: inotify_init() r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r3 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x80) r4 = epoll_create1(0x0) fcntl$lock(r4, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x6000000}) r5 = epoll_create1(0x0) fcntl$lock(r5, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}) sendfile(r3, r2, 0x0, 0x283) [ 153.995512][ T8655] netlink: 44623 bytes leftover after parsing attributes in process `syz-executor.1'. [ 154.066247][ T8655] netlink: 44623 bytes leftover after parsing attributes in process `syz-executor.1'. 10:36:49 executing program 5: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl(r4, 0x890e, &(0x7f0000000200)="080db5055e0bcfe8336341d924ff8b6426e9020147a071c650161e91aa7bd94da769c6f9de2ba1b83e9a238ab2c84dc169e5aacbea150db63783eeebbd917b28ae67a00266513e1611dea8633a5fc5448c2bfb70a847f1cc6eaaed4c5b8a1980166b1533eb03c7a4a0858edd6f6c6c4fe4176ef9cfe6c985fa7f4d0f568d49fda572b5145d8bd4f54ec1a2853244b3fdda1f2a") r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r1, 0x0, 0x100000001) [ 154.121688][ T8667] overlayfs: unrecognized mount option "lo!Írdir=./le1" or missing value [ 154.180798][ T8677] overlayfs: unrecognized mount option "lo!Írdir=./le1" or missing value 10:36:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/116) write$binfmt_script(r0, &(0x7f0000001380)=ANY=[@ANYRESHEX=0x0], 0x12) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r5, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r5, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 10:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000280)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x74, 0x4, 0x8, 0x801, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8808}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x21e8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x61a}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xfbfb}]}, 0x74}, 0x1, 0x0, 0x0, 0x44000010}, 0x48001) 10:36:49 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10, 0x800) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x1, 0x7, 0x201}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r4, 0x0, 0x80000000, 0x0) 10:36:49 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@rand_addr="55e8fea4fe535225578420ca375b5fd7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, {0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@loopback}, 0x2, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xb8112, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x84480, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f736770931128ebcac23000"], &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000140)='cgroup\x00', 0x80, &(0x7f0000000200)='bfs\x00') 10:36:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xa, 0x1, @broadcast}]}, 0x2c}}, 0x0) 10:36:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x88002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000000)=0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}, 0xfdef) 10:36:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000280)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x74, 0x4, 0x8, 0x801, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8808}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x21e8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x61a}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xfbfb}]}, 0x74}, 0x1, 0x0, 0x0, 0x44000010}, 0x48001) [ 154.485054][ T8699] cgroup: Unknown subsys name 'bfs' [ 154.518817][ T8708] cgroup: Unknown subsys name 'bfs' 10:36:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 10:36:49 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2800) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000040)={0x9, 0x1}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[]}}, 0x0) 10:36:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14481}, 0x0, 0xffffffffffffffff, r5, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r6) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xffffffffffffffc2) 10:36:49 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@rand_addr="55e8fea4fe535225578420ca375b5fd7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, {0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@loopback}, 0x2, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xb8112, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x84480, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f736770931128ebcac23000"], &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000140)='cgroup\x00', 0x80, &(0x7f0000000200)='bfs\x00') 10:36:49 executing program 4: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x80, 0x0, 0x0, 0x0, 0x7ffffffffffa, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x22, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x9000000) 10:36:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000000)={0x1, 0x2, 0x401}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_mpls={0x3c, 0x1, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_MPLS_LABEL={0x8}, @TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x4}}]}, {0x4}}}]}]}, 0x54}}, 0x0) [ 154.821770][ C1] hrtimer: interrupt took 45597 ns [ 154.897961][ T8735] cgroup: Unknown subsys name 'bfs' 10:36:50 executing program 2: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@rand_addr="55e8fea4fe535225578420ca375b5fd7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, {0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x10000}, {0x0, 0x0, 0x0, 0x2}}, {{@in6=@loopback}, 0x2, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa}], 0xb8112, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x84480, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f736770931128ebcac23000"], &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000140)='cgroup\x00', 0x80, &(0x7f0000000200)='bfs\x00') 10:36:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000140)='./file1\x00', 0x401000000010800, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x41090, &(0x7f0000000240)={[{@fat=@discard='discard'}], [{@smackfsroot={'smackfsroot', 0x3d, '-'}}, {@uid_gt={'uid>', r3}}, {@pcr={'pcr', 0x3d, 0x1d}}]}) 10:36:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x4, 0x3}]}, 0x24}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) ioprio_get$uid(0x3, r7) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000002900)={0x28, r4, 0xf591d3ee456bd401, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c000}, 0x48051) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0xf, 0x12, 0x15f, &(0x7f0000000280)}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bind$rds(r9, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) 10:36:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)={0x98, r1, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x68, 0x8, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x3c, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x98}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000000)=0x9) r4 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0xc9095ba04274a951) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000ec0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r5}}}, @rthdr_2292={{0x18}}], 0x40}}], 0x1, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0xc9095ba04274a951) sendmmsg$inet6(r6, &(0x7f0000000ec0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="2400000000000000295ee16099232e7f49f7ff00000000000010ffff000000002b42f850de1d13708b03a8dc95318f5dd525be2b5249260083d2e8813a1c5dbed78939f4f7e1b3d6105413bc3004a6d04953119e11280e9f3c547728597430676e4247a70e53c4b5e16038b9d2c0417919a4b0ec06d7e1aadfd717ba62a093da7b1574e18cdc5744a637027caa9637696eecf070c100fc99c76da71a50646d71d3e7d3a1fb4360a2c3dcabcec4cd3dc5bddf5406f6aabb176f9f5407d2781f46e08573416db0ac9381e7da0d6c77f1315a4eb8289ba0dac067571cd18e1b3800"/234, @ANYRES32=r8, @ANYBLOB="000000001800000000000000290000003900"/28], 0x40}}], 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=@can_delroute={0x1bc, 0x19, 0x4, 0x70bd27, 0x25dfdbfb, {0x1d, 0x1, 0x7}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x6, 0x1, 0x0, 0x0, "d9a6d64dcff931f3"}, 0x1}}, @CGW_MOD_AND={0x15, 0x1, {{{0x3, 0x0, 0x0, 0x1}, 0x5, 0x1, 0x0, 0x0, "df84116a9061fe4a"}, 0x8}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x1, 0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, "39f2097e5f1e0a32"}, 0x3}}, @CGW_DST_IF={0x8, 0xa, r5}, @CGW_MOD_OR={0x15, 0x2, {{{0x1, 0x1, 0x1}, 0x1, 0x2, 0x0, 0x0, "bf544ed5f2dda3ab"}, 0x4}}, @CGW_SRC_IF={0x8, 0x9, r8}, @CGW_CS_CRC8={0x11e, 0x6, {0x3b, 0x4f, 0x20, 0x5, 0x4, "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", 0x3, "455940c4e38bc4652b953351b99e8398a8576466"}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x1, 0x0, 0x1}, 0x7, 0x0, 0x0, 0x0, "277423f4daa54e1a"}}}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x10}, 0x40080) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000040)={0xb5ea, 0x4, 0x7fff, 0x4005, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000001c0)={r9, 0x8}, &(0x7f0000000200)=0x8) [ 155.267589][ T8764] cgroup: Unknown subsys name 'bfs' [ 155.325548][ T8763] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 155.382960][ T8759] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 10:36:50 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000340)='./control\x00', 0x0) creat(&(0x7f00000000c0)='./control/file1\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000240)={'bridge_slave_1\x00', {0x2, 0x4e24, @local}}) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000080)='./control\x00') 10:36:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b40)="cc4570b67a3d42d980b7b28fb76140fbe067012412ed1d52a8e3c8ab10958b7796c00677982e2af5c6e7cec07ed3166519d3684d4f3472590a88120a6ebf0ff0f327b363913a1bb784bcc09518e6e0061e5594595046aa260e424b5c2853a2f50e7c4f684848602e6a3e7fd6177969c59c09a7", 0x73}, {&(0x7f0000000bc0)="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", 0x1000}], 0x2, 0x0, 0x0, 0xf000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000001300290a000000000000000007000040", @ANYRES32=r6, @ANYBLOB="000b00000000000004000380"], 0x24}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000b00)={0xa, &(0x7f0000000280)=""/151, &(0x7f0000000a00)=[{0x20, 0x89, 0xcac, &(0x7f0000000380)=""/137}, {0x8, 0x1d, 0x2, &(0x7f0000000440)=""/29}, {0x54, 0x35, 0xfffffffa, &(0x7f0000000480)=""/53}, {0x8, 0xca, 0x4, &(0x7f0000001e80)=""/202}, {0x86b7ea7, 0xac, 0x2, &(0x7f0000000600)=""/172}, {0x3, 0x39, 0xffff6623, &(0x7f00000004c0)=""/57}, {0x9, 0xee, 0x6, &(0x7f00000006c0)=""/238}, {0xff, 0x72, 0x0, &(0x7f00000007c0)=""/114}, {0x2f80, 0xae, 0x2, &(0x7f0000000840)=""/174}, {0x81, 0xc3, 0x93, &(0x7f0000000900)=""/195}]}) sendmsg$IPVS_CMD_GET_SERVICE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)={0x14, r8, 0x1}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000001d40)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ppoll(&(0x7f0000001c40)=[{r1, 0x4041}, {0xffffffffffffffff, 0x2100}, {0xffffffffffffffff, 0x7}, {0xffffffffffffffff, 0x216}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x6}, {0xffffffffffffffff, 0x810}, {0xffffffffffffffff, 0xc200}, {0xffffffffffffffff, 0x1000}, {0xffffffffffffffff, 0x1000}], 0xa, &(0x7f0000001cc0)={0x77359400}, &(0x7f0000001d00)={[0x4]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000000)) 10:36:50 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x14) syz_emit_ethernet(0x22, &(0x7f0000000000)={@random="c547d1aa8842", @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x33, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$capi20_data(r1, &(0x7f0000000040)={{0x10, 0xfb7, 0x82, 0x80, 0xfffd, 0x4}, 0xf4, "e0f93c7a57650cd209fd06fca710a5515c6f6a5bcdba1586a302e49dbd827eda0ef787c12e53db1d37e9fcfea7db4aeadc50a852ef56622dc07a52ec83625e0dc085ee1f527bf8545d74c6ad5a408dcd8b2a78c711af95d7f2361882032d394115b8464678aded36a9a246ceb9a1d097fc87ca08019082a5f20c39c5d051273f789bb8137e8883fa5e8d52d6d6c08cfc545eec28912cbba9c92842bb07f374877ec5b3c1afc5a79c36b76d11d58e7d92ea9671619149ee4f9af5b76e4a39ddb39620f4152770bd2e304df39b6ee5396da9fb5400d8838bd623cb4ce483b2231899b0fba167179067a470be69724c1759c21d0b4e"}, 0x106) 10:36:50 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000140)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000000)=0x6, 0x4) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x9) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x200) close(r1) 10:36:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xb) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5, 0x3, 0x9}, @IFLA_GENEVE_ID={0x8, 0x1, 0x1}, @IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x68}}, 0x20000040) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 10:36:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x10002) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="1c0000001a00110214f9f40703090400110000000002000000020000", 0x1c) 10:36:50 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@func, @map={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x40000000}, @exit]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x761b80) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x42, 0x6, &(0x7f0000000440)=[{&(0x7f0000000140)="b9c2de7ec5", 0x5, 0x6}, {&(0x7f0000000180)="8ebb284ef530a6f92b44035fbf1acebb23338ac30008b1a96b291d4639c3f974ac3c79c14077031c5b2de44de05da2d430b623640fc0ee99d2399bd6e2211620050de0770bca583c5a80a29af121327235874954fecaaa6b76e3fa1f46c992c731246687e1150c31151939d2d51923fb6811f7cf266d172d41a4eca46164195a080a73691a7ff3519eb014aaa535f400f6b2cfdbe03e2804beb0032a5ae01d6c086bd8daf5375e76fdf8c37b6e5861df65448300ea3a26532e7f9aff5c", 0xbd, 0x8}, {&(0x7f0000000240)="2b8ac53ad8735505d816e2f1e8f398a40b682f29538df202d1c0d6bfd245c44ce572c3f15ff682cae6a3f67c0cf86d5e7a9c19e3fcaa7c6886d0b80df9a6b3ce04b0bc912c33996c9f039c4df56186bbc1d301fbf5a42b08e71b76233ce8c65370889db491b877da72248563ca93b91abbd077e13d8ff567202515297639fde4fabec29737daf3c7d20c19ae8aa1d3", 0x8f, 0xffff}, {&(0x7f0000000300)="6e75380cb07e446536eb9950041124ddbfb56fbb4aeda137fa93e420d312ad9688b610e1409622f36e6bd5db83956ed5004aa4b53f876285ac52960c1efc76340121caaec9a5134a88d49f6fed87d44b139ba1b083e302d57483d0257340a0523bb19900ef257e8dce406d9540d9e83232cd695b78c52e033ce52fde5c63ceb8c0bcf28d844ba42880eef4ad6c912af40e5086ebe0c587aeb7de04e9bd336acbd18334c36eb5e13d4147def94b42b8470b3159f0b5d7a7ab772d3f", 0xbb, 0x9}, {&(0x7f00000003c0)="d8e9c3a51155485a18b2e6cb0e4cff", 0xf, 0x1}, {&(0x7f0000000400)="7b3c194bcf", 0x5, 0x3}], 0x2040028, 0x0) [ 155.629032][ T8778] device geneve2 entered promiscuous mode 10:36:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9000000010001fff000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="ed01060000000000680012800b000100697036746e6c000058000280080008002c00000004001300060012000001000014000200fe800000000000000000001c000000aa0800080001000000080014002000000014000300ff01ffe900000000000000000000000108000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="56d5a3faf4ceefd48b8e1a2b6db4fb5e8c27a1c4d7075dc9e6d30db21dbb84e16579d36010d794832fa89c39d6005cc41be5060000001aeea7bd857b44393dca6f22a997ba1681c7bbbcfdfbf013a9599c9287b40cb05ae9f6a0e9e012a6996ccb8296061b8e37048e174dcf28a350d61ce725cb104f59fb5334d4db8ac410773100"/142], 0x90}}, 0x0) 10:36:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x10002) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="1c0000001a00110214f9f40703090400110000000002000000020000", 0x1c) 10:36:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) getsockname(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "2f1ab460ae627a835e3933321a6a5aecc6a5acf61a62541bbeb219dcee2e3e332ac1326ef24bdf14124ff89f35c043f383f12fd300b80985e799aa5fa3a3e691533161d8a1efe7910667268e6b39f4b3fbe527875a454b9e98af09cc7d148d155849893f8e595919ae84ed7fc3eba06ee01ce36b070e4cdd31d4e51997294ec7d63f38c7f4e499332b962ed9fb9562fa2d7f6b04cba488ee3e3ae929af4328a2e704e116df36f7d1be0200fe6fec5e0bf0cc2694a625ffd8f2e7001b9988fd59ca21a3c9e99cc9486fb1ccf2889f69b089481ad3d1a460d22b3ca91280a7cad5212c28d0d0c5752960a68f0bc110d3"}, 0xfffffffffffffce7) 10:36:51 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x143802, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000002c0)=""/4096) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:36:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32, 0x0, 0x4}, 0x9c) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'], 0x1acf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0)=0x1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 155.996521][ T8813] device ip6tnl1 entered promiscuous mode 10:36:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040), 0x4) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x441, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) sendto$inet6(r3, &(0x7f00000002c0)='`', 0x1, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x7b, &(0x7f0000000080)={r5}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x8000, 0x7fff, 0x80000000, r5}, 0x10) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {0x0}], 0x6, 0x60}}], 0x48}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) mount$9p_tcp(0x0, &(0x7f0000000e80)='./file0\x00', 0x0, 0x40000, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3278303030303030303030303030346532312c6163636573733d616e792c6e6f6465766d21702c6e6f6465766d617038000000ea000020582c6163636573733d616e792c736d61636b66736465663d7b5c76626f786e1dd1167b6365"]) [ 156.311459][ T8790] device geneve2 entered promiscuous mode 10:36:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x10002) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0xfd57) write(r0, &(0x7f0000000380)="1c0000001a00110214f9f40703090400110000000002000000020000", 0x1c) 10:36:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r5, 0xc0884113, &(0x7f0000000140)={0x1, 0x5, 0x3, 0x0, 0xff, 0x1, 0x100000001, 0x2, 0x6, 0xfffffffffffffffa, 0x3, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_GET_FEATURES(r7, 0x8008af00, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r8, 0x0, 0x10000000000443) 10:36:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast2}]}}}]}, 0x38}}, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) fcntl$setsig(r1, 0xa, 0x2a) 10:36:51 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000080)=0x6) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r8, &(0x7f0000001480)=ANY=[@ANYBLOB="1b5d5062", @ANYRESHEX, @ANYRESOCT=r1, @ANYRESHEX=r3, @ANYRESHEX, @ANYRES16=r6, @ANYRESHEX=r7, @ANYPTR, @ANYRESOCT=r6], 0x84) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r9, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$binfmt_elf64(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5d5062", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES64=r9, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYRESDEC, @ANYRESHEX=0x0, @ANYPTR64, @ANYRES16, @ANYRES16=r8]], 0xc) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7311deffffff9a12c31eae7594f93ca5d747ee7bdb6e4d652c0800000041d1d938332d6367e46a5d6063bd9941f96f9c9f36ec6899c3ac46f57edd3fa12f3beb26cddff0e135c40bf73a2334bbc77c03014bff7e09a24240c6a2abe45f293ebb3fc7bf31146812aa272add3caee1dae06e99dde043383bb6d123e7db17417ef8aa73266c377e94c29cb378a816db516673c7ff8e5ab3651bec1d96bd8c2408e61d966c5e0cb97b04d2007e5c92bf2d705bad31ed713231f2ef81c498fdacfb", @ANYRES32=r6], 0x29) close(r2) socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 10:36:51 executing program 4: r0 = socket(0x2, 0x1000000000000002, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40042, 0x0) write$P9_RSTATu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e4c54f1db91d23ffff5c5691f2f6242831d49fa1bce48a03d7be2c8db93aec8ea2ce6b338552dc32cc8bac"], 0x26) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r1, 0x0, 0xffff, 0x9) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, 0x0, 0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="fe81423e3eb14a207e9d0e3d18088e3ac99cac1a0fe35b150a801fae95426d6090e3b72abc1e1272dfbc7e0068e30b5d29986851f79656291f", 0x39, 0x4000, 0x0, 0x0) 10:36:51 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000080)={0x40, "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"}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000400)={0x17, 0xf4, &(0x7f0000000300)="08d4865834d78e5e13f9e04652481e986986f8651409644d281855c8f5f2c01549a0177862252fd74e06760ee66187d35bde7faf2b305f2698aaa561d43f04259869d835ea1e56ebabad54c9dc1875e030ec4e645c6352a94a99c49288b492700ca15e10bab2653653c917e65d4c9813f7f6b9456377ac900b884975d6c14f8a343b23f3649b72a0f2ca3f98d646f3c6d79c351369c3b21d6c76003e8816e4d71e770f7bc24534ce3c612d745b253f66f2e949615b46ac397e2e2ca1bae955b031d05256a8ba9a857aa8a291c4cccfca51934eed5a69e8420b2923f42fa98bac6ce872fc19a432e411b8fd8e0be7269b586c1f04"}) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) 10:36:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x3, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3, 0x74b300) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000300)={0x1, 0x1, 0x18, 0xb, 0x1d4, &(0x7f0000000740)}) r3 = dup(r0) ioctl$KDDELIO(r3, 0x4b35, 0xffff) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x358, 0x0, 0x1f0, 0x0, 0x0, 0x1f0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x3, 0x0, {[{{@ip={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1f0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'ip6erspan0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 10:36:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) fcntl$setstatus(r2, 0x4, 0x40800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0285628, &(0x7f0000000040)={0x0, 0x10001, 0xffff, [], &(0x7f0000000000)=0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getdents64(r7, &(0x7f0000000080)=""/39, 0x27) setreuid(0x0, r3) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 10:36:52 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}, 0x1, 0x0, 0x0, 0xc0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000140)={&(0x7f0000000000), &(0x7f0000000080)=""/152, 0x98}) 10:36:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0xa10000, 0x81, 0x0, r0, 0x0, &(0x7f0000000040)={0xa30904, 0x0, [], @ptr}}) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000140)) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @aes256, 0x0, "38b37b5308145820"}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ptrace$peekuser(0x3, r1, 0x7) ioctl$int_in(r4, 0x800000c0045005, &(0x7f0000000000)=0x7b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = dup2(0xffffffffffffffff, r5) getsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x4, 0x0, &(0x7f0000000080)) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x1}, {0xa, 0x0, 0x0, @empty}, r8}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e22, 0x10001, @dev={0xfe, 0x80, [], 0x36}, 0x1}, r8}}, 0x38) 10:36:52 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x0, 0x48, 0x0, 0x0, 0x0, 0x1, 0x4}, r0, 0x4, 0xffffffffffffffff, 0xe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r1, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x2bf}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}}], 0x127ad, 0x0) [ 156.999262][ T8870] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 10:36:52 executing program 3: syz_mount_image$ntfs(&(0x7f0000000540)='ntfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@disable_sparse_no='disable_sparse=no'}, {@errors_recover='errors=recover'}, {@uid={'uid'}}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@disable_sparse_no='disable_sparse=no'}, {@errors_remount='errors=remount-ro'}, {@errors_recover='errors=recover'}, {@gid={'gid'}}, {@utf8='utf8'}]}) r0 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:36:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) fcntl$setstatus(r2, 0x4, 0x40800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0285628, &(0x7f0000000040)={0x0, 0x10001, 0xffff, [], &(0x7f0000000000)=0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getdents64(r7, &(0x7f0000000080)=""/39, 0x27) setreuid(0x0, r3) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 10:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@time_offset={'time_offset'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000140)=""/142) [ 157.215935][ T8893] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 157.236506][ C1] [ 157.236511][ C1] ===================================== [ 157.236513][ C1] WARNING: bad unlock balance detected! [ 157.236518][ C1] 5.6.0-rc6-syzkaller #0 Not tainted [ 157.236521][ C1] ------------------------------------- 10:36:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) [ 157.236525][ C1] syz-executor.3/8893 is trying to release lock (rcu_callback) at: [ 157.236541][ C1] [] rcu_lock_release+0x0/0x20 [ 157.236543][ C1] but there are no more locks to release! [ 157.236546][ C1] [ 157.236546][ C1] other info that might help us debug this: [ 157.236550][ C1] 1 lock held by syz-executor.3/8893: [ 157.236552][ C1] #0: ffff88804f57c0d8 (&type->s_umount_key#56/1){+.+.}, at: alloc_super+0x160/0x760 [ 157.236570][ C1] [ 157.236570][ C1] stack backtrace: [ 157.236578][ C1] CPU: 1 PID: 8893 Comm: syz-executor.3 Not tainted 5.6.0-rc6-syzkaller #0 [ 157.236582][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.236585][ C1] Call Trace: [ 157.236600][ C1] [ 157.236636][ C1] dump_stack+0x1e9/0x30e [ 157.236644][ C1] ? rcu_lock_acquire+0x30/0x30 [ 157.236673][ C1] print_unlock_imbalance_bug+0x20b/0x240 [ 157.236683][ C1] ? do_raw_spin_unlock+0x134/0x8d0 [ 157.236692][ C1] ? __bitmap_andnot+0x316/0x330 [ 157.236703][ C1] lock_release+0x37c/0x720 [ 157.236711][ C1] ? rcu_lock_acquire+0x30/0x30 [ 157.236718][ C1] ? zap_class+0xd30/0xd30 [ 157.236725][ C1] rcu_core+0x7f0/0x1080 [ 157.236739][ C1] __do_softirq+0x268/0x7c5 [ 157.236748][ C1] ? irq_exit+0x223/0x230 [ 157.236757][ C1] irq_exit+0x223/0x230 [ 157.236766][ C1] smp_apic_timer_interrupt+0x113/0x280 [ 157.236774][ C1] apic_timer_interrupt+0xf/0x20 [ 157.236777][ C1] [ 157.236784][ C1] RIP: 0010:console_unlock+0xa25/0xec0 [ 157.236791][ C1] Code: 20 00 74 0c 48 c7 c7 18 d4 0a 89 e8 e5 be 52 00 48 83 3d 15 ae ac 07 00 0f 84 65 04 00 00 e8 12 80 16 00 48 8b 7c 24 10 57 9d <0f> 1f 44 00 00 f6 44 24 07 01 75 52 e8 fa 7f 16 00 eb 63 0f 1f 84 [ 157.236795][ C1] RSP: 0018:ffffc900018378e0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 157.236802][ C1] RAX: ffffffff815e260e RBX: 0000000000000200 RCX: 0000000000040000 [ 157.236807][ C1] RDX: ffffc9000fd11000 RSI: 000000000001d12e RDI: 0000000000000282 [ 157.236811][ C1] RBP: ffffc90001837998 R08: ffffffff817a3210 R09: fffffbfff121aff9 [ 157.236815][ C1] R10: fffffbfff121aff9 R11: 0000000000000000 R12: dffffc0000000000 [ 157.236820][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff892be518 [ 157.236830][ C1] ? trace_hardirqs_on+0x30/0x70 [ 157.236836][ C1] ? console_unlock+0xa1e/0xec0 [ 157.236848][ C1] ? __down_trylock_console_sem+0x178/0x1b0 [ 157.236854][ C1] ? vprintk_emit+0x1db/0x3b0 [ 157.236859][ C1] ? vprintk_emit+0x1db/0x3b0 [ 157.236867][ C1] vprintk_emit+0x1f8/0x3b0 [ 157.236875][ C1] printk+0x62/0x83 [ 157.236883][ C1] ? __ntfs_warning+0x15e/0x190 [ 157.236892][ C1] __ntfs_warning+0x185/0x190 [ 157.236900][ C1] ? _parse_integer+0x147/0x190 [ 157.236907][ C1] ? parse_options+0x39d/0x1dd0 [ 157.236914][ C1] ? _parse_integer_fixup_radix+0x46/0x300 [ 157.236925][ C1] parse_options+0xe83/0x1dd0 [ 157.236938][ C1] ntfs_fill_super+0x1e2/0x89f0 [ 157.236945][ C1] ? pointer+0x23f/0x7c0 [ 157.236962][ C1] ? snprintf+0x6f/0x90 [ 157.236970][ C1] ? set_blocksize+0x1a8/0x3b0 [ 157.236979][ C1] mount_bdev+0x232/0x340 [ 157.236986][ C1] ? ntfs_mount+0x40/0x40 [ 157.236996][ C1] legacy_get_tree+0xea/0x180 [ 157.237003][ C1] ? ntfs_rl_punch_nolock+0x17d0/0x17d0 [ 157.237011][ C1] vfs_get_tree+0x88/0x270 [ 157.237020][ C1] do_mount+0x17d5/0x2440 [ 157.237028][ C1] ? _copy_from_user+0x116/0x170 [ 157.237039][ C1] __se_sys_mount+0xd3/0x100 [ 157.237048][ C1] do_syscall_64+0xf3/0x1b0 [ 157.237059][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.237064][ C1] RIP: 0033:0x45f29a [ 157.237071][ C1] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 157.237075][ C1] RSP: 002b:00007f5652206a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 157.237082][ C1] RAX: ffffffffffffffda RBX: 00007f56522076d4 RCX: 000000000045f29a [ 157.237086][ C1] RDX: 00007f5652206ae0 RSI: 0000000020000580 RDI: 00007f5652206b00 [ 157.237090][ C1] RBP: 000000000076bf00 R08: 00007f5652206b40 R09: 00007f5652206ae0 10:36:52 executing program 2: r0 = memfd_create(&(0x7f0000000300), 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000000), 0x4) remap_file_pages(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000003, 0x7f, 0x10) [ 157.237095][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 157.237099][ C1] R13: 0000000000000be3 R14: 00000000004ce052 R15: 000000000076bf0c [ 157.697044][ T8893] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 157.708911][ T8897] Dev loop4: unable to read RDB block 1 10:36:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x143, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="5c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800e00010069703665727370616e00000018000280040012000500160002000000050017000000000008001c0088b972bc2f978f0363db36c4cc8131e34514f93dc5fb100a6516194754e18b3e61a4190eeae1aa7e38e1baa0bd0f9db530bf50b6effeddefe3a4", @ANYRES32=r2, @ANYBLOB="0500100006000000"], 0x5c}}, 0x0) [ 157.731142][ T8897] loop4: unable to read partition table [ 157.737894][ T8897] loop4: partition table beyond EOD, truncated [ 157.746895][ T8897] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 157.760519][ T8879] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 157.763251][ T8907] mmap: syz-executor.2 (8907) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 10:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@time_offset={'time_offset'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000140)=""/142) 10:36:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 157.825981][ T8912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 157.848922][ T8893] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 157.861206][ T8920] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 157.877237][ T8916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 157.972539][ T8893] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:36:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) 10:36:53 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x254, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xffffffc3}, 0x0) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000140)=0x4) [ 158.026549][ T8920] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:53 executing program 3: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0xe, 0x4, 0x2f1d}, &(0x7f00000001c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x40}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r6, 0x0, 0x1000007ffff000) listen(0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:36:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:36:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 158.219379][ T8947] team0: Device ipvlan1 failed to register rx_handler [ 158.229075][ T8946] Dev loop4: unable to read RDB block 1 [ 158.243194][ T8946] loop4: unable to read partition table [ 158.254400][ T8946] loop4: partition table beyond EOD, truncated 10:36:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 158.345983][ T8946] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:53 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x254, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xffffffc3}, 0x0) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000140)=0x4) 10:36:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 158.496284][ T8972] team0: Device ipvlan1 failed to register rx_handler 10:36:53 executing program 3: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0xe, 0x4, 0x2f1d}, &(0x7f00000001c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x40}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r6, 0x0, 0x1000007ffff000) listen(0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:36:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:36:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) 10:36:53 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) 10:36:54 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 158.868191][ T8995] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:54 executing program 3: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0xe, 0x4, 0x2f1d}, &(0x7f00000001c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x40}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r6, 0x0, 0x1000007ffff000) listen(0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:36:54 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x254, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xffffffc3}, 0x0) r1 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000140)=0x4) 10:36:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:36:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:36:54 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 159.030514][ T9004] Dev loop4: unable to read RDB block 1 [ 159.046022][ T9004] loop4: unable to read partition table [ 159.095434][ T9004] loop4: partition table beyond EOD, truncated [ 159.134648][ T9004] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 159.135127][ T9021] team0: Device ipvlan1 failed to register rx_handler 10:36:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 159.296949][ T9027] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:54 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 159.348456][ T9034] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:54 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 159.436444][ T9046] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:54 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc090000000000003a5b0000000000000000000000000000ffff000000000000"], 0x78) [ 159.506367][ T9044] Dev loop4: unable to read RDB block 1 [ 159.519643][ T9044] loop4: unable to read partition table 10:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 159.573673][ T9044] loop4: partition table beyond EOD, truncated [ 159.579973][ T9044] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 159.623113][ T9061] Dev loop5: unable to read RDB block 1 [ 159.628963][ T9061] loop5: unable to read partition table [ 159.635441][ T9061] loop5: partition table beyond EOD, truncated [ 159.649615][ T9061] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 10:36:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x4, 0x4) open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x8900) dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000240)={[], 0x1, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x4000, [], 0x81}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x13) sendmsg$inet6(r2, &(0x7f0000000000)={&(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00'/32, @ANYRES32=r10, @ANYBLOB], 0x28}, 0x0) 10:36:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) 10:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) [ 159.715950][ T9062] Dev loop2: unable to read RDB block 1 [ 159.722011][ T9062] loop2: unable to read partition table [ 159.727779][ T9062] loop2: partition table beyond EOD, truncated [ 159.734436][ T9062] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 10:36:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r9, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) 10:36:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000040)) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 159.934468][ T9081] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000040)) 10:36:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x8, 0x0, "7be06c1ff21a803ce11fb719b0f03cc32fb8a54e9587a4dc33b4f414aacb06aa", 0x3, 0x3, 0x6, 0x6, 0x20}) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000000000)={r6, 0x0, 0x2, r6}) dup3(r5, r1, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x71ac7}) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 160.053905][ T9100] Dev loop4: unable to read RDB block 1 [ 160.072314][ T9100] loop4: unable to read partition table 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000040)) [ 160.103936][ T9100] loop4: partition table beyond EOD, truncated [ 160.111592][ T9099] Dev loop2: unable to read RDB block 1 [ 160.117168][ T9099] loop2: unable to read partition table [ 160.123421][ T9099] loop2: partition table beyond EOD, truncated [ 160.129893][ T9099] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 160.130006][ T9100] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r11, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r10, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000040)) 10:36:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) 10:36:55 executing program 3: setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000440)='security.capability\x00', &(0x7f0000000480)=@v1={0x1000000, [{0x8, 0x80000001}]}, 0xc, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000015c0)={0x2, 0x1, &(0x7f00000004c0)=""/74, &(0x7f0000000540)=""/4096, &(0x7f0000001540)=""/101, 0x2000}) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000001600)='/dev/vcs#\x00', 0xf266, 0x4000) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000001640)={0x7f, 0x8}, 0x2) mount$bpf(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='bpf\x00', 0x818094, &(0x7f0000000140)={[{@mode={'mode', 0x3d, 0x800}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x900b}}], [{@smackfsroot={'smackfsroot', 0x3d, '\\\'vboxnet0'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x3, 0x3, 0x5, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x5}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x101}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x7}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20000012) setxattr$trusted_overlay_upper(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0xf7, 0x4, 0x5, "c329a90ac51b3db8222f0863221a6ff4", "6dbd938eb539b858105a49e44a833dcd094e1253985813e339f5d0111aaf632e9febe0544a40a5967b0aa48bdaf521148550ab22d524874f59816e684035d361a8ab38441b14d89355bcc423e3a698e93832009d670afb0820b35679e6755e194e267be6fa66c80f79376fec6c814c268991e7eba753cc09c6a60d1ad153aac1a984e2f19deb2432d84eeb1d07ef80cf83e835a0e6f2df4d38f325c42ad07b4ef5fa93e192531d4a5791ef85ebe00c23a143d63d037aab7157969efded5cccd017b215a61b7838bd19af74cbc774df6dca08674ec248c6485fc705b2ec610207c979"}, 0xf7, 0x3) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) 10:36:55 executing program 3: getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) futex(&(0x7f0000000000), 0x9, 0x0, 0x0, 0x0, 0x2) [ 160.461242][ T9138] Dev loop4: unable to read RDB block 1 [ 160.461265][ T9139] Dev loop2: unable to read RDB block 1 [ 160.478214][ T9138] loop4: unable to read partition table [ 160.498309][ T9138] loop4: partition table beyond EOD, truncated 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 160.518995][ T9138] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 160.548104][ T9139] loop2: unable to read partition table [ 160.553960][ T9139] loop2: partition table beyond EOD, truncated [ 160.561370][ T9139] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) 10:36:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) sendmsg$NET_DM_CMD_STOP(r9, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8805) 10:36:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) 10:36:55 executing program 5: close(0xffffffffffffffff) [ 160.729985][ T9170] Dev loop4: unable to read RDB block 1 [ 160.741354][ T9170] loop4: unable to read partition table [ 160.763094][ T9170] loop4: partition table beyond EOD, truncated 10:36:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) [ 160.799939][ T9170] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:56 executing program 5: close(0xffffffffffffffff) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) 10:36:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) [ 160.911323][ T9181] Dev loop2: unable to read RDB block 1 [ 160.920209][ T9181] loop2: unable to read partition table [ 160.967499][ T9181] loop2: partition table beyond EOD, truncated [ 161.020412][ T9181] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 161.135586][ T9201] Dev loop4: unable to read RDB block 1 [ 161.145640][ T9201] loop4: unable to read partition table [ 161.152433][ T9201] loop4: partition table beyond EOD, truncated [ 161.159967][ T9201] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) 10:36:56 executing program 5: close(0xffffffffffffffff) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc09"], 0x5a) 10:36:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) 10:36:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) socket$inet6(0xa, 0x8000080003, 0x800000000000005) 10:36:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) 10:36:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) 10:36:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 161.455542][ T9217] Dev loop2: unable to read RDB block 1 [ 161.492492][ T9221] Dev loop4: unable to read RDB block 1 [ 161.518551][ T9221] loop4: unable to read partition table [ 161.537125][ T9217] loop2: unable to read partition table [ 161.548675][ T9221] loop4: partition table beyond EOD, truncated 10:36:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000"], 0x3c) 10:36:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 161.568069][ T9221] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d00"], 0x4b) 10:36:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 161.631168][ T9217] loop2: partition table beyond EOD, truncated [ 161.661121][ T9217] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) 10:36:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d00"], 0x4b) 10:36:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) 10:36:57 executing program 3: close(0xffffffffffffffff) 10:36:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d00"], 0x4b) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:57 executing program 3: close(0xffffffffffffffff) [ 161.919024][ T9268] Dev loop4: unable to read RDB block 1 [ 161.934828][ T9272] Dev loop2: unable to read RDB block 1 [ 161.950123][ T9268] loop4: unable to read partition table 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 161.950165][ T9268] loop4: partition table beyond EOD, truncated [ 161.957082][ T9268] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 161.966884][ T9272] loop2: unable to read partition table [ 161.966924][ T9272] loop2: partition table beyond EOD, truncated [ 161.966934][ T9272] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:57 executing program 3: close(0xffffffffffffffff) 10:36:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 10:36:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) 10:36:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e0000"], 0x53) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e0000"], 0x53) 10:36:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) [ 162.318024][ T9305] Dev loop2: unable to read RDB block 1 [ 162.324170][ T9303] Dev loop4: unable to read RDB block 1 [ 162.348265][ T9303] loop4: unable to read partition table [ 162.354520][ T9305] loop2: unable to read partition table [ 162.354563][ T9305] loop2: partition table beyond EOD, truncated [ 162.354574][ T9305] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 162.364434][ T9303] loop4: partition table beyond EOD, truncated [ 162.364467][ T9303] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) socket$inet6(0xa, 0x8000080003, 0x800000000000005) 10:36:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e0000"], 0x53) 10:36:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e000000000000"], 0x57) 10:36:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 162.674214][ T9337] Dev loop2: unable to read RDB block 1 [ 162.694222][ T9340] Dev loop4: unable to read RDB block 1 [ 162.699801][ T9340] loop4: unable to read partition table [ 162.761332][ T9337] loop2: unable to read partition table [ 162.805441][ T9337] loop2: partition table beyond EOD, truncated [ 162.842489][ T9337] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e000000000000"], 0x57) [ 162.875383][ T9340] loop4: partition table beyond EOD, truncated [ 162.915326][ T9340] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e000000000000"], 0x57) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000fc"], 0x59) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000"], 0x58) [ 163.129290][ T9381] Dev loop2: unable to read RDB block 1 [ 163.166414][ T9381] loop2: unable to read partition table 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 163.182008][ T9383] Dev loop4: unable to read RDB block 1 [ 163.193952][ T9383] loop4: unable to read partition table 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000"], 0x58) [ 163.242080][ T9381] loop2: partition table beyond EOD, truncated [ 163.268939][ T9383] loop4: partition table beyond EOD, truncated [ 163.298430][ T9383] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 163.318599][ T9381] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e00000000000000"], 0x58) 10:36:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b5b073b0000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000040000289d0000000000001e0000"], 0x53) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 163.554759][ T9420] Dev loop4: unable to read RDB block 1 [ 163.565258][ T9420] loop4: unable to read partition table [ 163.584215][ T9420] loop4: partition table beyond EOD, truncated 10:36:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 163.602667][ T9420] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 163.647509][ T9423] Dev loop2: unable to read RDB block 1 [ 163.678443][ T9423] loop2: unable to read partition table 10:36:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 163.708430][ T9423] loop2: partition table beyond EOD, truncated [ 163.727434][ T9423] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 163.744519][ T9436] Dev loop1: unable to read RDB block 1 [ 163.752394][ T9436] loop1: unable to read partition table 10:36:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 163.766890][ T9436] loop1: partition table beyond EOD, truncated [ 163.781922][ T9436] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 163.948170][ T9456] Dev loop4: unable to read RDB block 1 [ 163.971093][ T9456] loop4: unable to read partition table [ 163.978254][ T9456] loop4: partition table beyond EOD, truncated [ 164.011318][ T9461] Dev loop2: unable to read RDB block 1 [ 164.016898][ T9461] loop2: unable to read partition table 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 164.073163][ T9456] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 164.116186][ T9461] loop2: partition table beyond EOD, truncated [ 164.139827][ T9461] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 164.191930][ T9469] Dev loop1: unable to read RDB block 1 [ 164.207718][ T9469] loop1: unable to read partition table [ 164.228485][ T9469] loop1: partition table beyond EOD, truncated 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 164.266611][ T9469] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) 10:36:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000001300290a000000000000000007000000", @ANYRES32=r10, @ANYBLOB="00000000000f000004000380cb2567e52a567346d8c4354a157f61e06717d192a9cae8bb1be0b9baafa33f9d121800f82f74e0ceeb2c5d7e13eafac65d6bd0482734f761659cbfc5a2989e5b006b2de0a631"], 0x24}}, 0x0) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 164.558839][ T9500] Dev loop4: unable to read RDB block 1 [ 164.615231][ T9500] loop4: unable to read partition table [ 164.620947][ T9500] loop4: partition table beyond EOD, truncated 10:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x0) 10:36:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 164.684745][ T9500] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 164.704381][ T9517] Dev loop1: unable to read RDB block 1 [ 164.710579][ T9517] loop1: unable to read partition table [ 164.717176][ T9517] loop1: partition table beyond EOD, truncated [ 164.724372][ T9517] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 10:36:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:36:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 10:36:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:37:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:37:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) 10:37:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) r8 = socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) 10:37:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:37:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 164.921260][ T9538] Dev loop4: unable to read RDB block 1 10:37:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 164.981388][ T9538] loop4: unable to read partition table 10:37:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) [ 165.034054][ T9538] loop4: partition table beyond EOD, truncated 10:37:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:37:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) [ 165.084554][ T9538] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 165.118482][ T9558] Dev loop1: unable to read RDB block 1 [ 165.187258][ T9558] loop1: unable to read partition table [ 165.196068][ T9558] loop1: partition table beyond EOD, truncated [ 165.203092][ T9558] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 10:37:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) 10:37:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 10:37:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) 10:37:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 10:37:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2b0d084265607341, 0x90) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d5062"], 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYRESDEC, @ANYRES32], @ANYBLOB="4f70ca2235e7e5c07ffa30e6e73c4c017f", @ANYRES16=r3]], 0x8) syz_read_part_table(0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000180)="02006800000ffffffff60005000000e08128b14700000000d59863d20000040002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6eb4c0000055aa", 0x5a, 0x19d}, {&(0x7f0000000000)="c2f4f8b8669e27d8892ed5d3abdf64cf0dca38f8", 0x14, 0x2}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r7) socket$inet6(0xa, 0x8000080003, 0x800000000000005) socket$netlink(0x10, 0x3, 0x0) 10:37:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xfffffffffffff