Warning: Permanently added '10.128.0.78' (ECDSA) to the list of known hosts. 2021/02/07 08:30:01 fuzzer started 2021/02/07 08:30:01 dialing manager at 10.128.0.163:46085 2021/02/07 08:30:01 checking machine... 2021/02/07 08:30:01 checking revisions... 2021/02/07 08:30:01 testing simple program... [ 28.851078][ T8415] IPVS: ftp: loaded support on port[0] = 21 [ 28.917028][ T8415] chnl_net:caif_netlink_parms(): no params data found [ 28.948153][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.955226][ T8415] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.962801][ T8415] device bridge_slave_0 entered promiscuous mode [ 28.970365][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.977423][ T8415] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.985029][ T8415] device bridge_slave_1 entered promiscuous mode [ 28.998575][ T8415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.009153][ T8415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.024388][ T8415] team0: Port device team_slave_0 added [ 29.031070][ T8415] team0: Port device team_slave_1 added [ 29.043297][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.050319][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.076499][ T8415] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.088286][ T8415] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.095738][ T8415] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.121835][ T8415] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.141622][ T8415] device hsr_slave_0 entered promiscuous mode [ 29.148252][ T8415] device hsr_slave_1 entered promiscuous mode [ 29.197530][ T8415] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.205959][ T8415] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.224046][ T8415] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.235736][ T8415] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.256470][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.263510][ T8415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.270793][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.277820][ T8415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.306940][ T8415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.317325][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.325334][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.333302][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.341585][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 29.351394][ T8415] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.360566][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.368826][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.375833][ T8634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.385715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.394201][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.401317][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.422418][ T8415] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.432780][ T8415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.444955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.453446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.461766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.470032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.478019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.485516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.502408][ T8415] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.510074][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.517389][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.532524][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.547558][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.556238][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.564046][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.572956][ T8415] device veth0_vlan entered promiscuous mode [ 29.582624][ T8415] device veth1_vlan entered promiscuous mode [ 29.598923][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 29.606680][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 29.614807][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.624711][ T8415] device veth0_macvtap entered promiscuous mode [ 29.633492][ T8415] device veth1_macvtap entered promiscuous mode [ 29.647389][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.654615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.663438][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 29.673771][ T8415] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.681392][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.691260][ T8415] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.700210][ T8415] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.708929][ T8415] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.717611][ T8415] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.746561][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 29.769395][ T3066] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 29.777262][ T3066] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 29.778103][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 29.787755][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 29.809790][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 2021/02/07 08:30:04 building call list... [ 29.994039][ T1967] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.083353][ T1967] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.152668][ T1967] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.213521][ T1967] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 31.131199][ T1967] device hsr_slave_0 left promiscuous mode [ 31.144568][ T1967] device hsr_slave_1 left promiscuous mode [ 31.151589][ T1967] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 31.159610][ T1967] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 31.167514][ T1967] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 31.174875][ T1967] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 31.183317][ T1967] device bridge_slave_1 left promiscuous mode [ 31.189893][ T1967] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.198147][ T1967] device bridge_slave_0 left promiscuous mode [ 31.204229][ T1967] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.213730][ T1967] device veth1_macvtap left promiscuous mode [ 31.220394][ T1967] device veth0_macvtap left promiscuous mode [ 31.226413][ T1967] device veth1_vlan left promiscuous mode [ 31.232692][ T1967] device veth0_vlan left promiscuous mode [ 31.990883][ T1967] team0 (unregistering): Port device team_slave_1 removed [ 32.000277][ T1967] team0 (unregistering): Port device team_slave_0 removed [ 32.009297][ T1967] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 32.021540][ T1967] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 32.044455][ T1967] bond0 (unregistering): Released all slaves [ 32.467119][ T8411] can: request_module (can-proto-0) failed. [ 32.553497][ T8411] can: request_module (can-proto-0) failed. [ 32.562315][ T8411] can: request_module (can-proto-0) failed. 2021/02/07 08:30:14 syscalls: 3470 2021/02/07 08:30:14 code coverage: enabled 2021/02/07 08:30:14 comparison tracing: enabled 2021/02/07 08:30:14 extra coverage: enabled 2021/02/07 08:30:14 setuid sandbox: enabled 2021/02/07 08:30:14 namespace sandbox: enabled 2021/02/07 08:30:14 Android sandbox: /sys/fs/selinux/policy does not exist 2021/02/07 08:30:14 fault injection: enabled 2021/02/07 08:30:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/07 08:30:14 net packet injection: enabled 2021/02/07 08:30:14 net device setup: enabled 2021/02/07 08:30:14 concurrency sanitizer: enabled 2021/02/07 08:30:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/07 08:30:14 USB emulation: enabled 2021/02/07 08:30:14 hci packet injection: enabled 2021/02/07 08:30:14 wifi device emulation: enabled 2021/02/07 08:30:14 fetching corpus: 0, signal 0/0 (executing program) 2021/02/07 08:30:14 fetching corpus: 0, signal 0/0 (executing program) 2021/02/07 08:30:16 starting 6 fuzzer processes 08:30:16 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:16 executing program 2: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:16 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) [ 43.069885][ T8764] IPVS: ftp: loaded support on port[0] = 21 [ 43.131328][ T8764] chnl_net:caif_netlink_parms(): no params data found [ 43.167710][ T8764] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.174802][ T8764] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.182565][ T8764] device bridge_slave_0 entered promiscuous mode [ 43.190101][ T8764] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.197420][ T8764] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.204877][ T8764] device bridge_slave_1 entered promiscuous mode [ 43.219588][ T8764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.230861][ T8764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.250498][ T8764] team0: Port device team_slave_0 added [ 43.257534][ T8764] team0: Port device team_slave_1 added [ 43.259059][ T8766] IPVS: ftp: loaded support on port[0] = 21 [ 43.270251][ T8764] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.278466][ T8764] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.305024][ T8764] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 43.317573][ T8764] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 43.324847][ T8764] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 43.350946][ T8764] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 43.392972][ T8764] device hsr_slave_0 entered promiscuous mode [ 43.404598][ T8764] device hsr_slave_1 entered promiscuous mode [ 43.420360][ T8768] IPVS: ftp: loaded support on port[0] = 21 [ 43.468065][ T8766] chnl_net:caif_netlink_parms(): no params data found [ 43.494082][ T8770] IPVS: ftp: loaded support on port[0] = 21 [ 43.559129][ T8766] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.566816][ T8766] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.574545][ T8766] device bridge_slave_0 entered promiscuous mode [ 43.582569][ T8766] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.589579][ T8766] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.597063][ T8766] device bridge_slave_1 entered promiscuous mode [ 43.656834][ T8764] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.663885][ T8764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.671093][ T8764] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.678116][ T8764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.698455][ T8772] IPVS: ftp: loaded support on port[0] = 21 [ 43.708686][ T8766] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 43.718884][ T8768] chnl_net:caif_netlink_parms(): no params data found [ 43.752023][ T8766] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 43.770086][ T8770] chnl_net:caif_netlink_parms(): no params data found [ 43.808018][ T8766] team0: Port device team_slave_0 added [ 43.816472][ T8766] team0: Port device team_slave_1 added [ 43.849694][ T8764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.888442][ T8774] IPVS: ftp: loaded support on port[0] = 21 [ 43.889913][ T8768] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.904659][ T8768] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.912452][ T8768] device bridge_slave_0 entered promiscuous mode [ 43.920010][ T8768] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.927483][ T8768] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.935114][ T8768] device bridge_slave_1 entered promiscuous mode [ 43.948426][ T8770] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.955833][ T8770] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.963436][ T8770] device bridge_slave_0 entered promiscuous mode [ 43.971684][ T8766] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 43.978600][ T8766] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.004519][ T8766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.022351][ T8768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.031547][ T8770] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.038562][ T8770] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.046615][ T8770] device bridge_slave_1 entered promiscuous mode [ 44.059742][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.067963][ T3857] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.075750][ T3857] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.083735][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 44.093612][ T8766] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.100609][ T8766] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.127046][ T8766] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.146138][ T8768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.157962][ T8764] 8021q: adding VLAN 0 to HW filter on device team0 [ 44.165921][ T8770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.176981][ T8770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.187735][ T8772] chnl_net:caif_netlink_parms(): no params data found [ 44.226379][ T8766] device hsr_slave_0 entered promiscuous mode [ 44.232878][ T8766] device hsr_slave_1 entered promiscuous mode [ 44.239238][ T8766] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.246860][ T8766] Cannot create hsr debugfs directory [ 44.254815][ T8768] team0: Port device team_slave_0 added [ 44.265636][ T8770] team0: Port device team_slave_0 added [ 44.281439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.289668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.298245][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.305337][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.313031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.321630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.329787][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.336805][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.344287][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 44.353536][ T8768] team0: Port device team_slave_1 added [ 44.367311][ T8770] team0: Port device team_slave_1 added [ 44.404597][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 44.416255][ T8772] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.423804][ T8772] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.424263][ T8772] device bridge_slave_0 entered promiscuous mode [ 44.438821][ T8772] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.446179][ T8772] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.453866][ T8772] device bridge_slave_1 entered promiscuous mode [ 44.463147][ T8774] chnl_net:caif_netlink_parms(): no params data found [ 44.478755][ T8770] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.485708][ T8770] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.512243][ T8770] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.526418][ T8770] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.533386][ T8770] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.559450][ T8770] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.570185][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 44.579698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 44.600277][ T8768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.607501][ T8768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.633737][ T8768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.652314][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 44.660158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 44.668799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 44.681234][ T8772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.694641][ T8768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.701770][ T8768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.727741][ T8768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.742471][ T8770] device hsr_slave_0 entered promiscuous mode [ 44.749008][ T8770] device hsr_slave_1 entered promiscuous mode [ 44.755502][ T8770] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.763152][ T8770] Cannot create hsr debugfs directory [ 44.769230][ T8772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.787605][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.795701][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.813310][ T8768] device hsr_slave_0 entered promiscuous mode [ 44.819680][ T8768] device hsr_slave_1 entered promiscuous mode [ 44.826234][ T8768] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 44.834031][ T8768] Cannot create hsr debugfs directory [ 44.850127][ T8772] team0: Port device team_slave_0 added [ 44.864229][ T8774] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.871441][ T8774] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.878903][ T8774] device bridge_slave_0 entered promiscuous mode [ 44.889927][ T8772] team0: Port device team_slave_1 added [ 44.899928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.908007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.918416][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 44.930138][ T8774] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.937204][ T8774] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.944817][ T8774] device bridge_slave_1 entered promiscuous mode [ 44.959091][ T8774] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.983608][ T8766] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 45.001414][ T8774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.010478][ T8766] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 45.019468][ T8772] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.026815][ T8772] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.052938][ T8772] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.078169][ T8766] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 45.087020][ T8766] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 45.096810][ T8772] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.104025][ T8772] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.130010][ T8772] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.140512][ T8634] Bluetooth: hci0: command 0x0409 tx timeout [ 45.147202][ T8774] team0: Port device team_slave_0 added [ 45.154287][ T8774] team0: Port device team_slave_1 added [ 45.167228][ T8774] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.174182][ T8774] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.200114][ T8774] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.214179][ T8774] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.221140][ T8774] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.247362][ T8774] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.258522][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.266264][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.279590][ T8764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.287910][ T8768] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 45.298918][ T4598] Bluetooth: hci1: command 0x0409 tx timeout [ 45.319916][ T8772] device hsr_slave_0 entered promiscuous mode [ 45.326286][ T8772] device hsr_slave_1 entered promiscuous mode [ 45.332748][ T8772] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.340281][ T8772] Cannot create hsr debugfs directory [ 45.351944][ T8768] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 45.368199][ T8774] device hsr_slave_0 entered promiscuous mode [ 45.376015][ T8774] device hsr_slave_1 entered promiscuous mode [ 45.382606][ T8774] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.390136][ T8774] Cannot create hsr debugfs directory [ 45.402045][ T8768] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 45.415371][ T8768] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 45.438568][ T8770] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 45.455269][ T4598] Bluetooth: hci2: command 0x0409 tx timeout [ 45.480887][ T8766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 45.490494][ T8770] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 45.508980][ T8772] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 45.520634][ T8772] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 45.540591][ T8766] 8021q: adding VLAN 0 to HW filter on device team0 [ 45.549042][ T4885] Bluetooth: hci3: command 0x0409 tx timeout [ 45.562469][ T8770] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 45.574719][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.582162][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 45.589659][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 45.598299][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 45.606959][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 45.615676][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 45.624263][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.631438][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.639443][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 45.647860][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 45.656143][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.663156][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.671444][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 45.679156][ T8772] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 45.690123][ T8772] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 45.696893][ T4598] Bluetooth: hci4: command 0x0409 tx timeout [ 45.708971][ T8770] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 45.721276][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 45.739279][ T8766] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 45.750422][ T8766] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 45.767611][ T8764] device veth0_vlan entered promiscuous mode [ 45.780076][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.789049][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 45.797790][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 45.806457][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 45.814819][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 45.823475][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 45.831811][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 45.839808][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 45.848360][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 45.856731][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 45.864850][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 45.874056][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 45.882036][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 45.889445][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 45.897313][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 45.905224][ T8634] Bluetooth: hci5: command 0x0409 tx timeout [ 45.918830][ T8766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.930251][ T8774] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 45.941152][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 45.948534][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 45.974822][ T8774] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 45.983582][ T8764] device veth1_vlan entered promiscuous mode [ 45.991337][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 45.999030][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.009047][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.020007][ T8768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.030506][ T8774] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 46.042131][ T8774] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 46.059312][ T8768] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.072422][ T8766] device veth0_vlan entered promiscuous mode [ 46.081509][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 46.089210][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.097988][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.106831][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.114535][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.122152][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.130400][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.138704][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.145758][ T8634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.161102][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.168611][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.176545][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.194422][ T8766] device veth1_vlan entered promiscuous mode [ 46.209563][ T8764] device veth0_macvtap entered promiscuous mode [ 46.217855][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.226467][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.235033][ T4885] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.242076][ T4885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.249668][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.258470][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.266824][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.283978][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.291899][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.300504][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 46.309118][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.317555][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 46.326052][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.335615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.350829][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.359042][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.367342][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.375672][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.386194][ T8772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.393612][ T8764] device veth1_macvtap entered promiscuous mode [ 46.402002][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.412271][ T8770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.439897][ T8766] device veth0_macvtap entered promiscuous mode [ 46.447716][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.455923][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.463659][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.471422][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.479475][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.488597][ T8772] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.503434][ T8764] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.512668][ T8766] device veth1_macvtap entered promiscuous mode [ 46.521659][ T8770] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.528804][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.537059][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.544893][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.552364][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.559673][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.568120][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.576798][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.584513][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.595907][ T8768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.606990][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.617269][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.626181][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.633201][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.641304][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.656016][ T8764] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.670941][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.679246][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.687867][ T8634] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.694901][ T8634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.702371][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.710963][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.719166][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.727588][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.736175][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.744407][ T8634] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.751437][ T8634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.759070][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.767469][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.775637][ T8634] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.782682][ T8634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.790432][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.798895][ T8634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 46.807562][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 46.818594][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.829161][ T8766] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.839193][ T8774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.858613][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 46.866649][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.875646][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.884455][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 46.893514][ T8766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 46.904081][ T8766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 46.914869][ T8766] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.929393][ T8774] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.944342][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.953913][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.962755][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.971564][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.979891][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 46.987699][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.995396][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.003778][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.012298][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.020741][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.028849][ T3857] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.036091][ T3857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.043755][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.053479][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.061713][ T3857] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.068815][ T3857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.076592][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.084811][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 47.093695][ T8766] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.102603][ T8766] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.111341][ T8766] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.120155][ T8766] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.140063][ T8768] device veth0_vlan entered promiscuous mode [ 47.162017][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 47.171125][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 47.179515][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 47.188213][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.196724][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.205053][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.213602][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 47.222250][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 47.230689][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.238871][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.247441][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.255740][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.263939][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.272294][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.280710][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.288730][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.297320][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.305641][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.318701][ T8635] Bluetooth: hci0: command 0x041b tx timeout [ 47.323810][ T8768] device veth1_vlan entered promiscuous mode [ 47.345302][ T8772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.358045][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.365666][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.373373][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.381346][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 47.389076][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 47.397582][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 47.406169][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 47.414407][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 47.422790][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.431229][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.440857][ T19] Bluetooth: hci1: command 0x041b tx timeout [ 47.457454][ T8770] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.461211][ T1967] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.476255][ T1967] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.478373][ T8770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.493061][ T8774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 47.509994][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 47.518365][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 47.527870][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 47.540586][ T8634] Bluetooth: hci2: command 0x041b tx timeout [ 47.545329][ T8772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.569121][ T8774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.585804][ T8768] device veth0_macvtap entered promiscuous mode [ 47.596373][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.604552][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.612193][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.619553][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.620503][ T8634] Bluetooth: hci3: command 0x041b tx timeout [ 47.627227][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 47.640250][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 47.647729][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 47.655980][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.664459][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 47.689077][ T8768] device veth1_macvtap entered promiscuous mode [ 47.689331][ T3066] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.716433][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.724021][ T3066] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.735212][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.746632][ T8770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.758639][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 47.766756][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 47.774630][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 47.790503][ T19] Bluetooth: hci4: command 0x041b tx timeout [ 47.811708][ T8768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.822607][ T8768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.832486][ T8768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 47.842905][ T8768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.853974][ T8768] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.862820][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 47.877700][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.889170][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 47.899596][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 47.908467][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 47.917220][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.940853][ T8635] Bluetooth: hci5: command 0x041b tx timeout [ 47.963667][ T3066] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 47.965670][ T8774] device veth0_vlan entered promiscuous mode [ 47.979831][ T8768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 47.991924][ T3066] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 47.992229][ T8768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.009772][ T8768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.020626][ T8768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.032670][ T8768] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.040074][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.062733][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 48.071519][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.080001][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.093462][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.115551][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.125127][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.134380][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 48.144905][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 48.154717][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.164308][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.176074][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.185568][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.194738][ T8770] device veth0_vlan entered promiscuous mode [ 48.207298][ T8774] device veth1_vlan entered promiscuous mode 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.218413][ T8768] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.227896][ T8768] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.241033][ T8768] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.249712][ T8768] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.268178][ T8772] device veth0_vlan entered promiscuous mode [ 48.285044][ T8770] device veth1_vlan entered promiscuous mode [ 48.300217][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 48.321008][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.335421][ T8772] device veth1_vlan entered promiscuous mode 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.361798][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.374571][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.386243][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 48.446758][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 48.457388][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.469834][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.489869][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.506125][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.519741][ T8772] device veth0_macvtap entered promiscuous mode 08:30:22 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 48.554181][ T8774] device veth0_macvtap entered promiscuous mode [ 48.572221][ T8770] device veth0_macvtap entered promiscuous mode [ 48.582137][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.593641][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.606486][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 48.616292][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 48.645153][ T4598] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 48.666124][ T8774] device veth1_macvtap entered promiscuous mode [ 48.675901][ T8770] device veth1_macvtap entered promiscuous mode [ 48.698137][ T8772] device veth1_macvtap entered promiscuous mode [ 48.710370][ T3066] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 48.718290][ T3066] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 48.763815][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.774428][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.784319][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.794796][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.804602][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.815110][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.825768][ T8770] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.836778][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.844705][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.852553][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.860415][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 48.868053][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 48.876785][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 48.888239][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.899809][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.909795][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.920437][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.930248][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.940660][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.950450][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 48.960966][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.971807][ T8772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.981507][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 48.992005][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.001937][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.012693][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.022663][ T8770] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.033289][ T8770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.044049][ T8770] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.054601][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.057188][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.070106][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.073529][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.090063][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.100513][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.110760][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.121403][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.131397][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.141859][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.151678][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 49.162182][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.173260][ T8774] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.180964][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.189707][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.198368][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.206817][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.215707][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.223508][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.232017][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.241845][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.252733][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.262599][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.273031][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.282935][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.293493][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.303300][ T8772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.313708][ T8772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.324667][ T8772] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.334905][ T8770] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.343907][ T8770] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.352795][ T8770] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.361541][ T8770] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.376665][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.387409][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.389474][ T8635] Bluetooth: hci0: command 0x040f tx timeout [ 49.399140][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.414030][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.424158][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.434755][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.444706][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.455592][ T8635] Bluetooth: hci1: command 0x040f tx timeout [ 49.460045][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.471498][ T8774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 49.481940][ T8774] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.492710][ T8774] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.500131][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.508514][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.517452][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.526268][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.535995][ T8772] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.545526][ T8772] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.554348][ T8772] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.563287][ T8772] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.580739][ T8774] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.589420][ T8774] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.599195][ T8774] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.607896][ T8774] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.616818][ T8635] Bluetooth: hci2: command 0x040f tx timeout [ 49.700245][ T8635] Bluetooth: hci3: command 0x040f tx timeout [ 49.728717][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.739072][ T3066] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 08:30:24 executing program 2: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) [ 49.763698][ T3066] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.771022][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.771104][ T3857] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.785922][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.806429][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.822916][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.846120][ T1967] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.848433][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.854137][ T8635] Bluetooth: hci4: command 0x040f tx timeout [ 49.860246][ T1967] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.870014][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.882620][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 49.897944][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.920032][ T1967] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.922350][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 49.927830][ T1967] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.943947][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 50.010389][ T8634] Bluetooth: hci5: command 0x040f tx timeout 08:30:24 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:24 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:24 executing program 2: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:24 executing program 2: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) [ 50.057589][ T36] audit: type=1400 audit(1612686624.366:2): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:24 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 50.221772][ T36] audit: type=1400 audit(1612686624.536:3): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:25 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 50.412853][ T36] audit: type=1400 audit(1612686624.726:4): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:25 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 51.105823][ T36] audit: type=1400 audit(1612686625.416:5): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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luetooth: hci0: command 0x0419 tx timeout [ 51.650169][ T19] Bluetooth: hci1: command 0x0419 tx timeout [ 51.690099][ T19] Bluetooth: hci2: command 0x0419 tx timeout [ 51.770443][ T19] Bluetooth: hci3: command 0x0419 tx timeout 08:30:26 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 51.929966][ T19] Bluetooth: hci4: command 0x0419 tx timeout 08:30:26 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 52.091950][ T19] Bluetooth: hci5: command 0x0419 tx timeout 08:30:26 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:26 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:27 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:28 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:29 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:29 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) [ 55.082164][ T36] audit: type=1400 audit(1612686629.396:6): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:29 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) [ 55.114211][ T36] audit: type=1400 audit(1612686629.426:7): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3AAE86AD47AA0D9495E6D80F7BDE2D18FFB36CF152AED2D408FB58E305FC8E2F2F7D91F81B621CC4214D4A24E1614FBEE0BEAC8F4A045072B770212D46D4A2DF096B791F2A4BA218E12C08FFFFFFFFFFFF43B4E1AD5A47B76AA24945B70A7C9DD5EDEAC52B5A876F73CFBE66371A72FD21E183088A1E4D9B8AEC4BF11F3D9544D6B59B4A55B2ABEE5CBF112AA480BD4DDEF272F90B8C101F8C1B5C8FE41E170FD0C775DBC5BE0B6D3AEABE6028A47C64AFB625AB702E5B1DC15F9C4B3D09BE812F340E681E8694F5BADF640DA3FDFC2F929B4C2BEB9A5949577287B6021BFEEC24146C7F95608BB60A736206A09D9F47E89C4044EADDDEFD15F25B822D2EAF2206DF0D6B71B63EE08415DAEA09AF36983578F6F4198A0843CC1B1BD780015007AB9709CC6211E3B5C685B972B5C5E95F054A7A9FE149282F679C8466B9734E3850EC98419DD0C887715918F9E7802842085BC606F30C2654869E7F2299FD0FC69137FE165592689465EEBD5CAFAD7C29DE2ADA6AD34DC5AEB7DEC45E965063E389CA6612E4C36C43A9150D5331ADBB0BEB01A062B1F1349FC2ECEA76CB7C40 [ 55.220700][ T36] audit: type=1400 audit(1612686629.536:8): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:29 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:29 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) [ 55.357913][ T36] audit: type=1400 audit(1612686629.656:9): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', ':\xae\x86\xadG\xaa\r\x94\x95\xe6\xd8\x0f{\xde-\x18\xff\xb3l\xf1R\xae\xd2\xd4\b\xfbX\xe3\x05\xfc\x8e//}\x91\xf8\x1bb\x1c\xc4!MJ$\xe1aO\xbe\xe0\xbe\xac\x8fJ\x04Pr\xb7p!-F\xd4\xa2\xdf\tky\x1f*K\xa2\x18\xe1,\b\xff\xff\xff\xff\xff\xffC\xb4\xe1\xadZG\xb7j\xa2IE\xb7\n|\x9d\xd5\xed\xea\xc5+Z\x87os\xcf\xbef7\x1ar\xfd!\xe1\x83\b\x8a\x1eM\x9b\x8a\xecK\xf1\x1f=\x95D\xd6\xb5\x9bJU\xb2\xab\xee\\\xbf\x11*\xa4\x80\xbdM\xde\xf2r\xf9\v\x8c\x10\x1f\x8c\x1b\\\x8f\xe4\x1e\x17\x0f\xd0\xc7u\xdb\xc5\xbe\vm:\xea\xbe`(\xa4|d\xaf\xb6%\xabp.[\x1d\xc1_\x9cK=\t\xbe\x81/4\x0eh\x1e\x86\x94\xf5\xba\xdfd\r\xa3\xfd\xfc/\x92\x9bL+\xeb\x9aYIWr\x87\xb6\x02\x1b\xfe\xec$\x14l\x7f\x95`\x8b\xb6\nsb\x06\xa0\x9d\x9fG\xe8\x9c@D\xea\xdd\xde\xfd\x15\xf2[\x82-.\xaf\"\x06\xdf\rkq\xb6>\xe0\x84\x15\xda\xea\t\xaf6\x985x\xf6\xf4\x19\x8a\bC\xcc\x1b\x1b\xd7\x80\x01P\a\xab\x97\t\xccb\x11\xe3\xb5\xc6\x85\xb9r\xb5\xc5\xe9_\x05Jz\x9f\xe1I(/g\x9c\x84f\xb9sN8P\xec\x98A\x9d\xd0\xc8\x87qY\x18\xf9\xe7\x80(B\b[\xc6\x06\xf3\f&T\x86\x9e\x7f\"\x99\xfd\x0f\xc6\x917\xfe\x16U\x92h\x94e\xee\xbd\\\xaf\xad|)\xde*\xdaj\xd3M\xc5\xae\xb7\xde\xc4^\x96Pc\xe3\x89\xcaf\x12\xe4\xc3lC\xa9\x15\rS1\xad\xbb\v\xeb\x01\xa0b\xb1\xf14\x9f\xc2\xec\xeav\xcb|@\xcd\xfe7\x81\x85\xf3\t\xb4#\x9b\x1dqAM\x0f\xdaZ\xfe\x10xF\x8e\x19a\xec\x1e\a,\xfe\'\xa2G\xf8Y2`\xcc\v\xd7#\xb1\xcc\xa8\x145\xf0A2\x7f\a\xf4S%\xfc\xd0Z|0\xf4~\x7f\a=\xccXO~\x05\x16\xcbt\xc5Z\n*0\xdc\x9f1c\x86\x0epS\xef\x82\tv\xd5\xd8\xfc\xc6\xdc\x8f|#:\xd1\xff\xf8z\"q\xccd3\xe9\xbd|\xba\x95R\xf5\xc7\xc0O$\xec\xcf k\xdbtUdS\xd4\nPv`f\x8c0\xf7r\x02\x80\xd8l\x10NX\xd3\rl\xb6U\xb5\xc3Ws\xf6\xec|z\x89\xce\xaf\xd0\x83\xa7\x80\xe0f>\xbf\xdcS\xd4\x8f^X\x14\xe0\vU\xff\x9a3\xf3\xed7]\xfbKG\xd8\x9aY\x9f1\xb0\xd6\x12\x82z\x8fn\x11s\xeb\xa9\x9f\xa9\xc9\x8fU\x9e\xfe\xb1\xe0\xc3\x96\xc6\xda\"_\xba\xd0\xdc\x88\x0e\x92=k.\xd2\x89\x0e\xed\x82U\xbd/\x82\x96\xb8\xd6\x89v*\xa0.\x13\x99\x04[\xc0\xcb\xec`F\x05t\xe2\xe0\r\xc3\x92!\xa4\xa0\xcb\x1d\xbb\xfaIs\xfc\xb7\xbev\xe8{\xdf\xe6\xbc\x14\x05kZ\x86}\x051b`h\x12OQ\x90\x06\xca%\xd7:\x9b\x11\x9d\xab\xd6\x93\xfe\x91\xa9\x1bd\rW\xe2v\x02}\x9e\xf4\x90\x06R5\x93T\a\xf7\xffs2s\x8avt\xc9j\x16\xd2v\x85\xe6]\x1b)\xa5\xbf#\xd5\xbc\xa2\xacM\"[8\x86\x907f\xe9\xf9\xb3\a\x85\xf9\x00\xce\xc9\"=\xb9\x8e\xd7o\xfb\xa8\xd0\xfc\\\xc7\x85\xb2\x95\xb6\x11x\xb4\xe7\x18\xe3\x9c:\x04\x03\x91\x17-.\xd9Q\xec-\xb3]*B{\x03\xbe\x11\x8f\xf1M~\xfc\fc4\xf0@~<\x0f^\x85\x12\x1c2\xe0\"\xa1-i\x01\xd2_\"\x9e\x94d\xb5l\x9d\xcfJK\xdf\x90h\x02\xfa+\xe2Q\x8cF\xaa\r\xfb\x00\x00\x00\x00\x00\x00\x81\xe8n\xcc\xa2\xd6|\x82\xaa\f\x03\xccX\tO\x14Xi\x03\x04\x96\x8a!\x16\x80\xbf\x80\xaaP\xe3\x83\xe2\xb8\x8b\x11&h\x1a]\xf5\xd6$\xe5\xa3{\v\x0eQ~!\xc0h\rL\xe0\x92\xc0\x12\xc6\x85\xda)\xf4h\xaex;\xb8\xea\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xfc4\x1b\xc87q\xb6\xdb?A^\x94\xdb\t\x1c\xcc%!\ft\xdf\xed5\xe7,z\x1b48eO\xc8\xbb\x95\x13\x1b\xaaW\x9c\xc1\xd5\xd9\xc3D-\xa6\x96\xfa1O\x16\xb2\x82BKP\x16f\xe9$\xaf\xdf\xb8YkBl\xb2$\xd4D\xf09Y;:\xb6\xf7\xbf\xb3\xd8\x8b\x8c\x90\xe6\x84\'I:\xec\x16\xfd\x83\xb9\xb5\t1d\xefik\xa1\xeaZ\x15\x90\xa6U=\xe6\xd5r'}, 0x436) 08:30:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) [ 55.493721][ T36] audit: type=1400 audit(1612686629.666:10): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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audit: type=1400 audit(1612686629.926:11): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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audit: type=1400 audit(1612686629.946:12): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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audit: type=1400 audit(1612686629.996:13): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name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executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000006, 0x100000002272, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "ffffbdffffffffff", "4d3382a01b9cd2ff600f000000000004", "ba5b9dbd", "baa281bde5832e34"}, 0x28) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x849fc000) socket$inet6_tcp(0xa, 0x1, 0x0) 08:30:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:30 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:30 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000007c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x2, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="f03be8c57b63", 0x0, 0x0, 0x0, 0x0, 0x0}) 08:30:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0023b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 08:30:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x40000000001e, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001140000001100df"], 0x80}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3, 0x1, 0x0, 0xf}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14}}, 0x74}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 08:30:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x4c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:30:31 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 56.089869][ T36] audit: type=1400 audit(1612686630.026:14): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3AAE86AD47AA0D9495E6D80F7BDE2D18FFB36CF152AED2D408FB58E305FC8E2F2F7D91F81B621CC4214D4A24E1614FBEE0BEAC8F4A045072B770212D46D4A2DF096B791F2A4BA218E12C08FFFFFFFFFFFF43B4E1AD5A47B76AA24945B70A7C9DD5EDEAC52B5A876F73CFBE66371A72FD21E183088A1E4D9B8AEC4BF11F3D9544D6B59B4A55B2ABEE5CBF112AA480BD4DDEF272F90B8C101F8C1B5C8FE41E170FD0C775DBC5BE0B6D3AEABE6028A47C64AFB625AB702E5B1DC15F9C4B3D09BE812F340E681E8694F5BADF640DA3FDFC2F929B4C2BEB9A5949577287B6021BFEEC24146C7F95608BB60A736206A09D9F47E89C4044EADDDEFD15F25B822D2EAF2206DF0D6B71B63EE08415DAEA09AF36983578F6F4198A0843CC1B1BD780015007AB9709CC6211E3B5C685B972B5C5E95F054A7A9FE149282F679C8466B9734E3850EC98419DD0C887715918F9E7802842085BC606F30C2654869E7F2299FD0FC69137FE165592689465EEBD5CAFAD7C29DE2ADA6AD34DC5AEB7DEC45E965063E389CA6612E4C36C43A9150D5331ADBB0BEB01A062B1F1349FC2ECEA76CB7C4 [ 57.005532][T10677] loop3: detected capacity change from 1 to 0 08:30:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 57.161363][ C0] hrtimer: interrupt took 35615 ns 08:30:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="d800000019008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001e28178a800160040000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fdffffffffffffffa4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93232a923e8027260e9703", 0xd8}], 0x1}, 0x0) 08:30:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) [ 57.189052][T10677] ldm_validate_privheads(): Disk read failed. [ 57.196669][T10677] loop3: p2 < > [ 57.200309][T10677] loop3: partition table partially beyond EOD, truncated [ 57.207750][T10677] loop3: p2 size 2 extends beyond EOD, truncated 08:30:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:30:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:30:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="d800000019008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001e28178a800160040000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fdffffffffffffffa4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93232a923e8027260e9703", 0xd8}], 0x1}, 0x0) 08:30:31 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 57.313151][T10719] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.348282][T10719] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 08:30:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:30:31 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 57.393671][T10719] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.415004][T10727] loop3: detected capacity change from 1 to 0 08:30:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="d800000019008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001e28178a800160040000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fdffffffffffffffa4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93232a923e8027260e9703", 0xd8}], 0x1}, 0x0) [ 57.445993][T10719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 57.458737][T10732] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.467798][T10732] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.480009][T10732] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 08:30:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) [ 57.488088][T10732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 57.498952][T10727] ldm_validate_privheads(): Disk read failed. [ 57.511005][T10727] loop3: p2 < > [ 57.517980][T10727] loop3: partition table partially beyond EOD, truncated [ 57.563102][T10727] loop3: p2 size 2 extends beyond EOD, truncated [ 57.588940][T10743] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.605766][T10743] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.622526][T10743] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 57.646188][T10743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 08:30:32 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:30:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="d800000019008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001e28178a800160040000100e5580000000002000000006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fdffffffffffffffa4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93232a923e8027260e9703", 0xd8}], 0x1}, 0x0) 08:30:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 08:30:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) 08:30:32 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) [ 58.672897][T10776] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 58.695746][T10776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 58.705498][T10779] loop3: detected capacity change from 1 to 0 08:30:33 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 58.750235][T10779] ldm_validate_privheads(): Disk read failed. [ 58.757665][T10779] loop3: p2 < > [ 58.780353][T10779] loop3: partition table partially beyond EOD, truncated [ 58.791625][T10779] loop3: p2 size 2 extends beyond EOD, truncated 08:30:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 58.803380][T10792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 08:30:33 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 59.056373][T10820] loop3: detected capacity change from 1 to 0 [ 59.139273][T10820] ldm_validate_privheads(): Disk read failed. [ 59.181658][T10820] loop3: p2 < > 08:30:33 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 59.223136][T10820] loop3: partition table partially beyond EOD, truncated [ 59.266936][T10820] loop3: p2 size 2 extends beyond EOD, truncated 08:30:33 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:33 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) 08:30:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 61.182987][T10948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:30:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) 08:30:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 61.402232][T10956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:30:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x424, r1, 0x1, 0x0, 0x0, {}, [{{0x388}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x2}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{}, {}, {}, {}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x424}}, 0x0) 08:30:35 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:35 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) [ 61.595287][T10965] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:30:36 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 61.792031][T10987] loop0: detected capacity change from 1 to 0 08:30:36 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:36 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 61.858827][T10987] ldm_validate_privheads(): Disk read failed. [ 61.865364][T10987] loop0: p2 < > [ 61.910753][T10987] loop0: partition table partially beyond EOD, truncated [ 61.949119][T10987] loop0: p2 size 2 extends beyond EOD, truncated 08:30:36 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:36 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000008000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r1}, 0x10) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000340)=ANY=[], 0x4b) sendfile(r3, r3, &(0x7f0000000200), 0xa198) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x0, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffe00, 0x1) 08:30:36 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 61.977693][T10993] loop5: detected capacity change from 1 to 0 [ 62.013128][T10998] loop2: detected capacity change from 1 to 0 08:30:36 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.061954][T10993] ldm_validate_privheads(): Disk read failed. [ 62.072984][T10998] ldm_validate_privheads(): Disk read failed. [ 62.076428][T10993] loop5: p2 < > [ 62.084986][T10993] loop5: partition table partially beyond EOD, truncated [ 62.092000][T10998] loop2: p2 < > [ 62.096115][T10998] loop2: partition table partially beyond EOD, truncated [ 62.107320][T10998] loop2: p2 size 2 extends beyond EOD, truncated [ 62.126132][T10993] loop5: p2 size 2 extends beyond EOD, truncated 08:30:36 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.172757][T11012] loop1: detected capacity change from 1 to 0 08:30:36 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.238493][T11020] loop0: detected capacity change from 1 to 0 08:30:36 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.291994][T11017] loop4: detected capacity change from 1 to 0 [ 62.305227][T11020] ldm_validate_privheads(): Disk read failed. [ 62.320166][T11020] loop0: p2 < > [ 62.324654][T11020] loop0: partition table partially beyond EOD, truncated [ 62.328933][T11012] ldm_validate_privheads(): Disk read failed. [ 62.339777][T11020] loop0: p2 size 2 extends beyond EOD, truncated [ 62.344447][T11012] loop1: p2 < > [ 62.349876][T11012] loop1: partition table partially beyond EOD, truncated [ 62.357076][T11012] loop1: p2 size 2 extends beyond EOD, truncated [ 62.357313][ T4894] ldm_validate_privheads(): Disk read failed. [ 62.370136][ T4894] loop0: p2 < > [ 62.373757][ T4894] loop0: partition table partially beyond EOD, truncated [ 62.381295][ T4894] loop0: p2 size 2 extends beyond EOD, truncated [ 62.382442][T11017] ldm_validate_privheads(): Disk read failed. [ 62.392737][T11037] loop2: detected capacity change from 1 to 0 [ 62.395604][T11017] loop4: p2 < > [ 62.405175][T11017] loop4: partition table partially beyond EOD, truncated [ 62.412727][T11017] loop4: p2 size 2 extends beyond EOD, truncated [ 62.509204][T11037] ldm_validate_privheads(): Disk read failed. [ 62.515424][T11046] loop3: detected capacity change from 1 to 0 [ 62.515700][T11037] loop2: p2 < > [ 62.525325][T11037] loop2: partition table partially beyond EOD, truncated [ 62.528511][T11051] loop5: detected capacity change from 1 to 0 [ 62.534116][T11037] loop2: p2 size 2 extends beyond EOD, truncated 08:30:36 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.638863][T11046] ldm_validate_privheads(): Disk read failed. [ 62.645303][T11046] loop3: p2 < > [ 62.649145][T11046] loop3: partition table partially beyond EOD, truncated [ 62.656399][T11046] loop3: p2 size 2 extends beyond EOD, truncated 08:30:37 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.718740][T11051] ldm_validate_privheads(): Disk read failed. [ 62.725172][T11051] loop5: p2 < > [ 62.729785][T11051] loop5: partition table partially beyond EOD, truncated [ 62.738022][T11051] loop5: p2 size 2 extends beyond EOD, truncated [ 62.744648][T11074] loop0: detected capacity change from 1 to 0 [ 62.798746][T11074] ldm_validate_privheads(): Disk read failed. [ 62.805359][T11074] loop0: p2 < > [ 62.809041][T11074] loop0: partition table partially beyond EOD, truncated [ 62.816522][T11074] loop0: p2 size 2 extends beyond EOD, truncated [ 62.841328][T11084] loop1: detected capacity change from 1 to 0 [ 62.859932][T11085] loop4: detected capacity change from 1 to 0 08:30:37 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 62.899125][T11091] loop3: detected capacity change from 1 to 0 [ 62.939059][T11099] loop2: detected capacity change from 1 to 0 [ 62.945287][T11084] ldm_validate_privheads(): Disk read failed. [ 62.951816][T11084] loop1: p2 < > [ 62.955421][T11084] loop1: partition table partially beyond EOD, truncated [ 62.962967][T11084] loop1: p2 size 2 extends beyond EOD, truncated [ 62.972956][T11085] ldm_validate_privheads(): Disk read failed. [ 62.981294][T11085] loop4: p2 < > [ 62.986497][T11085] loop4: partition table partially beyond EOD, truncated [ 62.994521][T11085] loop4: p2 size 2 extends beyond EOD, truncated [ 63.009598][T11091] ldm_validate_privheads(): Disk read failed. [ 63.016254][T11091] loop3: p2 < > [ 63.019995][T11091] loop3: partition table partially beyond EOD, truncated [ 63.027249][T11091] loop3: p2 size 2 extends beyond EOD, truncated [ 63.051140][T11099] ldm_validate_privheads(): Disk read failed. [ 63.057817][T11099] loop2: p2 < > [ 63.063031][T11099] loop2: partition table partially beyond EOD, truncated [ 63.070503][T11099] loop2: p2 size 2 extends beyond EOD, truncated 08:30:37 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.141641][T11115] loop5: detected capacity change from 1 to 0 08:30:37 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:37 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.271902][T11115] ldm_validate_privheads(): Disk read failed. [ 63.280585][T11115] loop5: p2 < > [ 63.295578][T11115] loop5: partition table partially beyond EOD, truncated [ 63.304054][T11115] loop5: p2 size 2 extends beyond EOD, truncated [ 63.313496][ T4894] ldm_validate_privheads(): Disk read failed. [ 63.320646][ T4894] loop5: p2 < > [ 63.320650][ T4894] loop5: partition table partially beyond EOD, truncated [ 63.320801][ T4894] loop5: p2 size 2 extends beyond EOD, truncated 08:30:37 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.370088][T11146] loop1: detected capacity change from 1 to 0 [ 63.384209][T11148] loop4: detected capacity change from 1 to 0 [ 63.394444][T11134] loop0: detected capacity change from 1 to 0 [ 63.402130][T11147] loop2: detected capacity change from 1 to 0 [ 63.411338][T11145] loop3: detected capacity change from 1 to 0 [ 63.578652][T11147] ldm_validate_privheads(): Disk read failed. [ 63.585149][T11147] loop2: p2 < > [ 63.589124][T11148] ldm_validate_privheads(): Disk read failed. [ 63.589780][T11147] loop2: partition table partially beyond EOD, truncated [ 63.595621][T11148] loop4: p2 < > [ 63.604120][T11146] ldm_validate_privheads(): Disk read failed. [ 63.606230][T11148] loop4: partition table partially beyond EOD, truncated [ 63.614834][T11134] ldm_validate_privheads(): Disk read failed. [ 63.621396][T11147] loop2: p2 size 2 extends beyond EOD, truncated [ 63.634744][T11148] loop4: p2 size 2 extends beyond EOD, truncated [ 63.642767][T11146] loop1: p2 < > [ 63.649356][T11146] loop1: partition table partially beyond EOD, truncated [ 63.656041][T11145] ldm_validate_privheads(): Disk read failed. [ 63.657158][T11134] loop0: p2 < > [ 63.666875][T11134] loop0: partition table partially beyond EOD, truncated [ 63.674706][T11146] loop1: p2 size 2 extends beyond EOD, truncated [ 63.675794][T11145] loop3: p2 < > [ 63.688026][T11134] loop0: p2 size 2 extends beyond EOD, truncated [ 63.694584][T11145] loop3: partition table partially beyond EOD, truncated 08:30:38 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.694725][T11145] loop3: p2 size 2 extends beyond EOD, truncated 08:30:38 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.789651][T11171] loop5: detected capacity change from 1 to 0 08:30:38 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:38 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:38 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 63.982516][T11171] ldm_validate_privheads(): Disk read failed. [ 64.009214][T11171] loop5: p2 < > [ 64.014853][T11192] loop2: detected capacity change from 1 to 0 [ 64.026617][T11171] loop5: partition table partially beyond EOD, truncated [ 64.034447][T11171] loop5: p2 size 2 extends beyond EOD, truncated [ 64.045552][T11199] loop0: detected capacity change from 1 to 0 [ 64.056249][T11197] loop1: detected capacity change from 1 to 0 [ 64.098627][T11192] ldm_validate_privheads(): Disk read failed. [ 64.105355][T11192] loop2: p2 < > [ 64.109251][T11192] loop2: partition table partially beyond EOD, truncated [ 64.116555][T11192] loop2: p2 size 2 extends beyond EOD, truncated [ 64.151357][T11205] loop4: detected capacity change from 1 to 0 [ 64.218265][T11199] ldm_validate_privheads(): Disk read failed. [ 64.225079][T11199] loop0: p2 < > [ 64.231042][T11199] loop0: partition table partially beyond EOD, truncated [ 64.238765][T11199] loop0: p2 size 2 extends beyond EOD, truncated [ 64.251501][T11197] ldm_validate_privheads(): Disk read failed. [ 64.257863][T11197] loop1: p2 < > [ 64.261724][T11197] loop1: partition table partially beyond EOD, truncated 08:30:38 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.269312][T11197] loop1: p2 size 2 extends beyond EOD, truncated [ 64.290924][T11210] loop3: detected capacity change from 1 to 0 08:30:38 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.429185][T11205] ldm_validate_privheads(): Disk read failed. [ 64.442336][T11205] loop4: p2 < > [ 64.445960][T11205] loop4: partition table partially beyond EOD, truncated [ 64.454776][T11205] loop4: p2 size 2 extends beyond EOD, truncated [ 64.468911][T11210] ldm_validate_privheads(): Disk read failed. 08:30:38 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:38 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.491554][T11210] loop3: p2 < > [ 64.505327][T11210] loop3: partition table partially beyond EOD, truncated [ 64.520328][T11210] loop3: p2 size 2 extends beyond EOD, truncated [ 64.528431][ T4894] ldm_validate_privheads(): Disk read failed. [ 64.535438][ T4894] loop3: p2 < > 08:30:38 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.540338][T11237] loop5: detected capacity change from 1 to 0 [ 64.540425][ T4894] loop3: partition table partially beyond EOD, truncated [ 64.553983][ T4894] loop3: p2 size 2 extends beyond EOD, truncated [ 64.556526][T11241] loop2: detected capacity change from 1 to 0 08:30:38 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.618257][T11237] ldm_validate_privheads(): Disk read failed. [ 64.627168][T11237] loop5: p2 < > [ 64.630835][T11237] loop5: partition table partially beyond EOD, truncated [ 64.638061][T11237] loop5: p2 size 2 extends beyond EOD, truncated [ 64.659540][T11241] ldm_validate_privheads(): Disk read failed. [ 64.659995][T11257] loop0: detected capacity change from 1 to 0 [ 64.666143][T11241] loop2: p2 < > [ 64.675398][T11241] loop2: partition table partially beyond EOD, truncated [ 64.683445][T11241] loop2: p2 size 2 extends beyond EOD, truncated [ 64.707358][T11259] loop1: detected capacity change from 1 to 0 [ 64.799981][T11269] loop4: detected capacity change from 1 to 0 08:30:39 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.848484][T11269] ldm_validate_privheads(): Disk read failed. [ 64.854777][T11269] loop4: p2 < > [ 64.858933][T11269] loop4: partition table partially beyond EOD, truncated [ 64.866236][T11269] loop4: p2 size 2 extends beyond EOD, truncated [ 64.887250][T11257] ldm_validate_privheads(): Disk read failed. 08:30:39 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.901643][T11257] loop0: p2 < > [ 64.919296][T11257] loop0: partition table partially beyond EOD, truncated [ 64.926697][T11257] loop0: p2 size 2 extends beyond EOD, truncated [ 64.927053][T11259] ldm_validate_privheads(): Disk read failed. 08:30:39 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 64.955359][T11259] loop1: p2 < > [ 64.960804][T11283] loop3: detected capacity change from 1 to 0 [ 64.967097][T11259] loop1: partition table partially beyond EOD, truncated [ 64.976905][T11259] loop1: p2 size 2 extends beyond EOD, truncated [ 65.069695][T11301] loop5: detected capacity change from 1 to 0 [ 65.077188][T11300] loop2: detected capacity change from 1 to 0 [ 65.086417][T11283] ldm_validate_privheads(): Disk read failed. [ 65.094180][T11283] loop3: p2 < > [ 65.097797][T11283] loop3: partition table partially beyond EOD, truncated [ 65.106932][T11283] loop3: p2 size 2 extends beyond EOD, truncated 08:30:39 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:39 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 65.179303][ T4894] ldm_validate_privheads(): Disk read failed. [ 65.185651][ T4894] loop2: p2 < > [ 65.185957][T11313] loop4: detected capacity change from 1 to 0 [ 65.191719][ T4894] loop2: partition table partially beyond EOD, [ 65.199198][T11301] ldm_validate_privheads(): Disk read failed. [ 65.206833][ T4894] truncated [ 65.215800][ T4894] loop2: p2 size 2 extends beyond EOD, truncated [ 65.217789][T11301] loop5: p2 < > [ 65.225909][T11301] loop5: partition table partially beyond EOD, truncated [ 65.233905][T11300] ldm_validate_privheads(): Disk read failed. [ 65.236154][T11301] loop5: p2 size 2 extends beyond EOD, [ 65.240677][T11300] loop2: p2 < > [ 65.241568][T11301] truncated [ 65.246544][T11300] loop2: partition table partially beyond EOD, truncated [ 65.262424][T11313] ldm_validate_privheads(): Disk read failed. [ 65.266591][T11300] loop2: p2 size 2 extends beyond EOD, [ 65.268930][T11313] loop4: p2 < > [ 65.268946][T11313] loop4: partition table partially beyond EOD, truncated [ 65.269217][T11313] loop4: p2 size 2 extends beyond EOD, truncated [ 65.270367][T11320] loop0: detected capacity change from 1 to 0 [ 65.271109][T11300] truncated 08:30:39 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:39 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 65.369783][T11328] loop1: detected capacity change from 1 to 0 08:30:39 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 65.410530][T11320] ldm_validate_privheads(): Disk read failed. [ 65.417511][T11320] loop0: p2 < > [ 65.421861][T11320] loop0: partition table partially beyond EOD, truncated [ 65.431948][T11320] loop0: p2 size 2 extends beyond EOD, truncated 08:30:39 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 65.488731][T11345] loop5: detected capacity change from 1 to 0 [ 65.488849][T11328] ldm_validate_privheads(): Disk read failed. [ 65.502554][T11328] loop1: p2 < > [ 65.506150][T11328] loop1: partition table partially beyond EOD, truncated [ 65.513793][T11328] loop1: p2 size 2 extends beyond EOD, truncated [ 65.522732][T11347] loop3: detected capacity change from 1 to 0 08:30:39 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 65.568460][T11347] ldm_validate_privheads(): Disk read failed. [ 65.575056][T11347] loop3: p2 < > [ 65.578854][T11347] loop3: partition table partially beyond EOD, truncated [ 65.579442][ T4894] ldm_validate_privheads(): Disk read failed. [ 65.586367][T11347] loop3: p2 size 2 extends beyond EOD, truncated [ 65.601794][ T4894] loop1: p2 < > [ 65.609603][ T4894] loop1: partition table partially beyond EOD, truncated [ 65.611285][T11345] ldm_validate_privheads(): Disk read failed. [ 65.616730][ T4894] loop1: p2 size 2 extends beyond EOD, truncated [ 65.623584][T11363] loop4: detected capacity change from 1 to 0 [ 65.630791][T11345] loop5: p2 < > [ 65.639975][T11345] loop5: partition table partially beyond EOD, truncated [ 65.649366][T11345] loop5: p2 size 2 extends beyond EOD, truncated 08:30:40 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) msgrcv(r0, 0x0, 0x81, 0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) [ 65.708503][T11363] ldm_validate_privheads(): Disk read failed. [ 65.723204][T11363] loop4: p2 < > [ 65.727346][T11363] loop4: partition table partially beyond EOD, truncated [ 65.734803][T11363] loop4: p2 size 2 extends beyond EOD, truncated [ 65.760712][T11374] loop2: detected capacity change from 1 to 0 08:30:40 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7e09c9", 0x30, 0x2f, 0x0, @private1, @mcast2, {[], {0x0, 0x883e, 0x30, 0x0, @opaque="62e7e7f50805827c3c4e50f28c4177b5d27cca551350983f6d4b49e4f648cd8734283f9dbe2c1de0"}}}}}}, 0x0) [ 65.809461][T11379] loop0: detected capacity change from 1 to 0 08:30:40 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:40 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:40 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7e09c9", 0x30, 0x2f, 0x0, @private1, @mcast2, {[], {0x0, 0x883e, 0x30, 0x0, @opaque="62e7e7f50805827c3c4e50f28c4177b5d27cca551350983f6d4b49e4f648cd8734283f9dbe2c1de0"}}}}}}, 0x0) [ 65.900661][T11374] ldm_validate_privheads(): Disk read failed. [ 65.919601][T11374] loop2: p2 < > [ 65.923245][T11374] loop2: partition table partially beyond EOD, truncated [ 65.932907][T11374] loop2: p2 size 2 extends beyond EOD, truncated [ 65.939399][T11379] ldm_validate_privheads(): Disk read failed. [ 65.949178][T11379] loop0: p2 < > [ 65.953137][T11379] loop0: partition table partially beyond EOD, [ 65.953533][T11399] loop4: detected capacity change from 1 to 0 [ 65.953874][T11379] truncated [ 65.977440][T11379] loop0: p2 size 2 extends beyond EOD, truncated 08:30:40 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7e09c9", 0x30, 0x2f, 0x0, @private1, @mcast2, {[], {0x0, 0x883e, 0x30, 0x0, @opaque="62e7e7f50805827c3c4e50f28c4177b5d27cca551350983f6d4b49e4f648cd8734283f9dbe2c1de0"}}}}}}, 0x0) 08:30:40 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 66.008877][T11399] ldm_validate_privheads(): Disk read failed. [ 66.015337][T11399] loop4: p2 < > [ 66.020094][T11399] loop4: partition table partially beyond EOD, truncated [ 66.027405][T11399] loop4: p2 size 2 extends beyond EOD, truncated [ 66.039345][ T4894] ldm_validate_privheads(): Disk read failed. [ 66.045613][ T4894] loop0: p2 < > [ 66.049205][ T4894] loop0: partition table partially beyond EOD, truncated 08:30:40 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7e09c9", 0x30, 0x2f, 0x0, @private1, @mcast2, {[], {0x0, 0x883e, 0x30, 0x0, @opaque="62e7e7f50805827c3c4e50f28c4177b5d27cca551350983f6d4b49e4f648cd8734283f9dbe2c1de0"}}}}}}, 0x0) 08:30:40 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 66.050004][T11407] loop5: detected capacity change from 1 to 0 [ 66.056310][ T4894] loop0: p2 size 2 extends beyond EOD, truncated 08:30:40 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="abe82d5e9d73748cbca0ae701600ed9b97c9f0d6d072166f7834ada63b1a72bf621edfe043ab5838c3f420a95c4589d45a1665d91ee121c8013aa4ff2be53efb5dfb8a71391a023470db59db24bd4cc8a52433897151a2d6699eae0d44b6ee1fa6c4b0509e65d5dafa37a3f438d1f46beb74fc35d8167bee0bada56f10df0dcec2e9d73fa8d0b680c1f3c351ac96bc988577c7f4e1bdd1979af0c4cd0e2c995520d7cc7a560404207e176e8dff5eb08b48f6986f643e7d28047bf166c0ee487a82dc7edbb98244b371a8363e5b453eafa9a36053005964804eae9856dc2dd14c191ea48998380bf5b39c36cc47e742cfe108eebd1d427ad97c5f0dd350e7723579005e813d211d901ad79d2e96f678be15edd9253e425a2fc9f0c2117c013e5107bc7d64d825a1e003dda5276db39f14d69363bc5e807a849b18a1e14be9b81190b27f0c3e3f1c65329da447443ff0210ff0abadc4fe1b037e058911229d9276af6d5157edb733ded617a8bd69592296ae92d81d77b386cd2ef08fbd6afd8d7035d96619a8c8a9022496a7d865f46828274b378f90cd826b6fb4f02f31d89e7acd5583", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 66.138768][T11407] ldm_validate_privheads(): Disk read failed. [ 66.145407][T11407] loop5: p2 < > [ 66.149804][T11407] loop5: partition table partially beyond EOD, truncated [ 66.158695][T11407] loop5: p2 size 2 extends beyond EOD, truncated [ 66.179029][T11429] loop2: detected capacity change from 1 to 0 [ 66.208540][T11429] ldm_validate_privheads(): Disk read failed. [ 66.215366][T11429] loop2: p2 < > [ 66.218959][T11429] loop2: partition table partially beyond EOD, truncated [ 66.226174][T11429] loop2: p2 size 2 extends beyond EOD, truncated 08:30:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) [ 66.258524][T11438] loop4: detected capacity change from 1 to 0 [ 66.351343][T11453] loop0: detected capacity change from 1 to 0 [ 66.359303][T11438] ldm_validate_privheads(): Disk read failed. [ 66.371261][T11438] loop4: p2 < > [ 66.375576][T11438] loop4: partition table partially beyond EOD, truncated [ 66.383259][T11438] loop4: p2 size 2 extends beyond EOD, truncated [ 66.411155][T11453] ldm_validate_privheads(): Disk read failed. [ 66.419058][T11453] loop0: p2 < > [ 66.422782][T11453] loop0: partition table partially beyond EOD, truncated [ 66.429374][T11462] loop2: detected capacity change from 4096 to 0 [ 66.430754][T11453] loop0: p2 size 2 extends beyond EOD, truncated [ 66.506359][ T36] audit: type=1800 audit(1612686640.818:15): pid=11470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=14202 res=0 errno=0 [ 66.527992][ T36] audit: type=1804 audit(1612686640.818:16): pid=11470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 66.553848][ T36] audit: type=1804 audit(1612686640.828:17): pid=11470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 66.579690][ T36] audit: type=1804 audit(1612686640.888:18): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 66.606001][ T36] audit: type=1804 audit(1612686640.888:19): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 66.637681][T11462] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:30:41 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0xcc, 0x3f, 0x2, 0x0, 0x1fc, 0xb1d67, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x1413d, 0x6, 0x8be, 0x6, 0x0, 0x46}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') keyctl$setperm(0x5, 0x0, 0x202022) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) personality(0x100005) fchdir(r1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000000)={0x7, 0x80000000}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={0x0, 0x1a3, 0x77}, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)="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", &(0x7f0000000800)=""/119) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x0) write$FUSE_OPEN(r2, &(0x7f0000000280)={0x20, 0xffffffffffffffda, 0x0, {0x0, 0x6}}, 0x20) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xa0, 0xfc, 0x9, 0x0, 0xbf, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4000005, 0x4, @perf_config_ext={0x80}, 0x400, 0xef9, 0x8000, 0xb7c0b0466fae0695, 0x3, 0xc1, 0x8000}, 0x0, 0xffffffffffffffff, r0, 0x3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') preadv(r2, &(0x7f0000000200)=[{&(0x7f00000005c0)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/257, 0x101}, {&(0x7f0000000480)=""/74, 0x4a}], 0x19, 0x6, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000940)=""/216, 0xd8) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8c7e33f9da29a26b, 0x1, 0xffffffff, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x6, 0x2, &(0x7f0000000580)=[{&(0x7f0000000080)="0300400d0314af00031400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}, {&(0x7f00000003c0)="e1ca06000000a506934926706a1603ddf3ad13d6862e54ae48c6ec970c17137a6a8169", 0x23, 0x5}]) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 08:30:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:41 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) msgrcv(r0, 0x0, 0x81, 0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) 08:30:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:41 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) [ 66.861433][T11490] loop5: detected capacity change from 1 to 0 08:30:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) [ 66.928524][T11490] ldm_validate_privheads(): Disk read failed. [ 66.954338][T11490] loop5: p2 < > [ 66.970939][T11490] loop5: partition table partially beyond EOD, truncated [ 66.987101][T11490] loop5: p2 size 2 extends beyond EOD, truncated [ 67.241971][ T36] audit: type=1804 audit(1612686641.558:20): pid=11470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 67.283471][ T36] audit: type=1804 audit(1612686641.588:21): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 67.310217][ T36] audit: type=1804 audit(1612686641.588:22): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 67.336632][ T36] audit: type=1804 audit(1612686641.598:23): pid=11476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 08:30:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) 08:30:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x0, 0x1, [{0x10}]}) 08:30:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) [ 67.363892][ T36] audit: type=1804 audit(1612686641.598:24): pid=11470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir137563236/syzkaller.R9L4J5/37/file0/file0" dev="sda1" ino=14202 res=1 errno=0 [ 67.521980][T11535] loop2: detected capacity change from 4096 to 0 [ 67.533069][T11535] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:30:42 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) msgrcv(r0, 0x0, 0x81, 0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) 08:30:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) 08:30:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) 08:30:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) 08:30:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x38, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}]}, 0x38}}, 0x0) [ 67.770059][T11550] loop0: detected capacity change from 4096 to 0 [ 67.799894][T11549] loop4: detected capacity change from 4096 to 0 [ 67.814167][T11535] syz-executor.2 (11535) used greatest stack depth: 9864 bytes left 08:30:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) 08:30:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) [ 67.840867][T11549] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 67.841522][T11550] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:30:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) [ 67.981544][T11575] loop2: detected capacity change from 4096 to 0 [ 67.999871][T11573] loop5: detected capacity change from 4096 to 0 [ 68.016256][T11574] loop1: detected capacity change from 4096 to 0 [ 68.023676][T11575] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 68.090513][T11573] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 68.120441][T11574] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:30:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) [ 68.525127][T11597] loop4: detected capacity change from 4096 to 0 [ 68.543923][T11597] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:30:42 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) msgrcv(r0, 0x0, 0x81, 0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) 08:30:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af30100040000000000000000000000020000", 0x3b}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) sendfile(r4, r3, 0x0, 0xa198) r5 = dup3(0xffffffffffffffff, r0, 0x80000) r6 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000180)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0x8010, r6, 0xa218f000) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x78, 0x9, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x44, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6}, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}]}, 0x78}, 0x1, 0x0, 0x0, 0x44881}, 0x4000010) sendfile(r2, r1, 0x0, 0xa198) [ 68.642711][T11575] syz-executor.2 (11575) used greatest stack depth: 9608 bytes left [ 68.721698][T11597] ================================================================== [ 68.729780][T11597] BUG: KCSAN: data-race in __xa_clear_mark / find_get_pages_range_tag [ 68.737925][T11597] [ 68.740234][T11597] write to 0xffff88813001dfb0 of 8 bytes by interrupt on cpu 1: [ 68.747852][T11597] __xa_clear_mark+0xff/0x1e0 [ 68.752515][T11597] test_clear_page_writeback+0x321/0x520 [ 68.758140][T11597] end_page_writeback+0xd7/0x260 [ 68.763070][T11597] ext4_finish_bio+0x429/0x480 [ 68.767831][T11597] ext4_end_bio+0x1ba/0x310 [ 68.772320][T11597] bio_endio+0x28d/0x350 [ 68.776546][T11597] blk_update_request+0x4f5/0xb40 [ 68.781564][T11597] blk_mq_end_request+0x22/0x50 [ 68.786413][T11597] lo_complete_rq+0xca/0x180 [ 68.790996][T11597] blk_done_softirq+0x145/0x190 [ 68.795834][T11597] __do_softirq+0x13c/0x2c3 [ 68.800332][T11597] run_ksoftirqd+0x13/0x20 [ 68.804738][T11597] smpboot_thread_fn+0x34f/0x520 [ 68.809680][T11597] kthread+0x20b/0x230 [ 68.813756][T11597] ret_from_fork+0x1f/0x30 [ 68.818169][T11597] [ 68.820490][T11597] read to 0xffff88813001dfb0 of 8 bytes by task 11597 on cpu 0: [ 68.828107][T11597] find_get_pages_range_tag+0x35c/0x600 [ 68.833647][T11597] pagevec_lookup_range_tag+0x37/0x50 [ 68.839011][T11597] __filemap_fdatawait_range+0xab/0x1b0 [ 68.844550][T11597] file_write_and_wait_range+0xea/0x120 [ 68.850089][T11597] ext4_sync_file+0x105/0x6e0 [ 68.854765][T11597] vfs_fsync_range+0x107/0x120 [ 68.859518][T11597] ext4_buffered_write_iter+0x38f/0x3e0 [ 68.865058][T11597] ext4_file_write_iter+0x47a/0x1060 [ 68.870344][T11597] do_iter_readv_writev+0x2cb/0x360 [ 68.875532][T11597] do_iter_write+0x112/0x4c0 [ 68.880115][T11597] vfs_iter_write+0x4c/0x70 [ 68.884603][T11597] iter_file_splice_write+0x41a/0x770 [ 68.889964][T11597] direct_splice_actor+0x80/0xa0 [ 68.894889][T11597] splice_direct_to_actor+0x345/0x650 [ 68.900248][T11597] do_splice_direct+0xf5/0x170 [ 68.905019][T11597] do_sendfile+0x5e0/0xcf0 [ 68.909428][T11597] __x64_sys_sendfile64+0xf2/0x130 [ 68.914523][T11597] do_syscall_64+0x39/0x80 [ 68.918932][T11597] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.924835][T11597] [ 68.927146][T11597] Reported by Kernel Concurrency Sanitizer on: [ 68.933272][T11597] CPU: 0 PID: 11597 Comm: syz-executor.4 Not tainted 5.11.0-rc6-syzkaller #0 [ 68.942017][T11597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.952058][T11597] ================================================================== [ 68.960098][T11597] Kernel panic - not syncing: panic_on_warn set ... [ 68.966660][T11597] CPU: 0 PID: 11597 Comm: syz-executor.4 Not tainted 5.11.0-rc6-syzkaller #0 [ 68.975414][T11597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 68.985475][T11597] Call Trace: [ 68.988739][T11597] dump_stack+0x116/0x15d [ 68.993079][T11597] panic+0x1e7/0x5fa [ 68.996973][T11597] ? vprintk_emit+0x2e2/0x360 [ 69.001661][T11597] kcsan_report+0x67b/0x680 [ 69.006175][T11597] ? kcsan_setup_watchpoint+0x472/0x4d0 [ 69.011716][T11597] ? find_get_pages_range_tag+0x35c/0x600 [ 69.017429][T11597] ? pagevec_lookup_range_tag+0x37/0x50 [ 69.022970][T11597] ? __filemap_fdatawait_range+0xab/0x1b0 [ 69.028677][T11597] ? file_write_and_wait_range+0xea/0x120 [ 69.034393][T11597] ? ext4_sync_file+0x105/0x6e0 [ 69.039233][T11597] ? vfs_fsync_range+0x107/0x120 [ 69.044168][T11597] ? ext4_buffered_write_iter+0x38f/0x3e0 [ 69.049887][T11597] ? ext4_file_write_iter+0x47a/0x1060 [ 69.055335][T11597] ? do_iter_readv_writev+0x2cb/0x360 [ 69.060704][T11597] ? do_iter_write+0x112/0x4c0 [ 69.065460][T11597] ? vfs_iter_write+0x4c/0x70 [ 69.070120][T11597] ? iter_file_splice_write+0x41a/0x770 [ 69.075662][T11597] ? direct_splice_actor+0x80/0xa0 [ 69.080771][T11597] ? splice_direct_to_actor+0x345/0x650 [ 69.086306][T11597] ? do_splice_direct+0xf5/0x170 [ 69.091239][T11597] ? do_sendfile+0x5e0/0xcf0 [ 69.095826][T11597] ? __x64_sys_sendfile64+0xf2/0x130 [ 69.101104][T11597] ? do_syscall_64+0x39/0x80 [ 69.105685][T11597] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.111751][T11597] ? __brelse+0x2c/0x50 [ 69.115898][T11597] kcsan_setup_watchpoint+0x472/0x4d0 [ 69.121264][T11597] find_get_pages_range_tag+0x35c/0x600 [ 69.126803][T11597] pagevec_lookup_range_tag+0x37/0x50 [ 69.132165][T11597] __filemap_fdatawait_range+0xab/0x1b0 [ 69.137707][T11597] ? __filemap_fdatawrite_range+0x1a8/0x1d0 [ 69.143592][T11597] file_write_and_wait_range+0xea/0x120 [ 69.149124][T11597] ext4_sync_file+0x105/0x6e0 [ 69.153790][T11597] ? tsan.module_ctor+0x10/0x10 [ 69.158630][T11597] vfs_fsync_range+0x107/0x120 [ 69.163389][T11597] ext4_buffered_write_iter+0x38f/0x3e0 [ 69.168929][T11597] ext4_file_write_iter+0x47a/0x1060 [ 69.174218][T11597] ? generic_file_buffered_read+0x981/0x9c0 [ 69.180106][T11597] do_iter_readv_writev+0x2cb/0x360 [ 69.185302][T11597] do_iter_write+0x112/0x4c0 [ 69.189876][T11597] ? splice_from_pipe+0xc0/0xc0 [ 69.194725][T11597] vfs_iter_write+0x4c/0x70 [ 69.199221][T11597] iter_file_splice_write+0x41a/0x770 [ 69.204594][T11597] ? splice_from_pipe+0xc0/0xc0 [ 69.209459][T11597] direct_splice_actor+0x80/0xa0 [ 69.214392][T11597] splice_direct_to_actor+0x345/0x650 [ 69.219753][T11597] ? do_splice_direct+0x170/0x170 [ 69.224867][T11597] do_splice_direct+0xf5/0x170 [ 69.229629][T11597] do_sendfile+0x5e0/0xcf0 [ 69.234038][T11597] __x64_sys_sendfile64+0xf2/0x130 [ 69.239151][T11597] do_syscall_64+0x39/0x80 [ 69.243570][T11597] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 69.249456][T11597] RIP: 0033:0x465b09 [ 69.253338][T11597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 69.267888][T11587] syz-executor.1 (11587) used greatest stack depth: 9352 bytes left [ 69.272932][T11597] RSP: 002b:00007f761540c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 69.289276][T11597] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 69.297238][T11597] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 69.305202][T11597] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 69.313157][T11597] R10: 000000000000a198 R11: 0000000000000246 R12: 000000000056bf60 [ 69.321135][T11597] R13: 00007fff724cfbcf R14: 00007f761540c300 R15: 0000000000022000 [ 69.329856][T11597] Kernel Offset: disabled [ 69.334160][T11597] Rebooting in 86400 seconds..