UT(r4, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000000c0)=0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:49 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000014000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:49 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00016e0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0xe80, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2750.042297][T31494] ldm_validate_privheads(): Disk read failed. [ 2750.075384][T31494] Dev loop4: unable to read RDB block 1 [ 2750.081218][T31494] loop4: unable to read partition table [ 2750.087069][T31494] loop4: partition table beyond EOD, truncated [ 2750.103921][T31494] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:49 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500ffffffe44200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:49 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000180), 0x104000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r5, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r5, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)={0x1}) tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240801001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r9, 0x8018457f, &(0x7f00000004c0)=""/146) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:49 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000740000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2750.356099][T31513] ldm_validate_privheads(): Disk read failed. [ 2750.405307][T31513] Dev loop4: unable to read RDB block 1 [ 2750.450761][T31504] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2750.483024][T31513] loop4: unable to read partition table [ 2750.580656][T31513] loop4: partition table beyond EOD, truncated [ 2750.586873][T31513] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2750.611259][T31504] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2750.641450][T31504] loop5: p2 < > [ 2750.679792][T31521] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. 23:18:50 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_procfs(r1, &(0x7f0000000340)='net/dev_mcast\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000007c0)={0x121c, 0xc, 0xb, 0x301, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x3}, [@typed={0xc, 0x5a, 0x0, 0x0, @u64=0x8}, @nested={0x1eb, 0x5, 0x0, 0x1, [@generic="7b365a48d5701373ed724f57a584e96eeb1b475907169bcde6986e", @generic="84cef8471762e19904e964ac987db81eff8fded6c5cd28d34364fe1374e8ce1686d3e0d74233bbb7c758feb63d29a84024a71655fe490e5baf3a95911a06b9c1d96059f0db77bb3fe5a2c99e9615bb1a7e206e4b1994bc10a7be6eade1407c9ce42a6bee0fe66bbbacb0d878a033c4e42c8b5596f1f6bbba80b417bc750e2d0cb2a6a4291edac8d25bbe9741c698d21d3d419985c9090c57fa840937423d318a7eded1de8e483197811f666649205b3fb1a11d5744782b6d26cf71b4a8bbf1dda0f75afd05e4e9e667638ad54b3e5fd109eeaf9c735c945ece807bc4f68c6549b4912dfe337b0aee4e8a76", @typed={0x14, 0x93, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="6d223953db71e90a05ca4a9ecb73bd7ce66648756882d961214df6b1a337668fdf652e2c65cb2ff90a1e1ec9751a7aacb4", @generic="3fc2b03277424a79a7656c1812010db5c8b118c113636e78918ac84217ab556d856894f3d2c8e028635ce6c6e40338d34352e5f87bfc6676bd796a3d3e0940fbc856442ddf8172d1dccbc639c98d3fb3b9c3f006595536c9764080acb75edef57868c2388cd35a15c22ea03e7a6e26df149dadab9f8b21983c4dc14d5ece7f079fa667022ee549007ecfa5420f5d252eed4cc75a2ad5551b2412980c"]}, @typed={0x8, 0x61, 0x0, 0x0, @uid=r3}, @generic="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", @typed={0x8, 0x80, 0x0, 0x0, @u32=0x800}]}, 0x121c}, 0x1, 0x0, 0x0, 0x4010}, 0x8010) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xffffff9e}, 0x0) 23:18:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x1100, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:18:50 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000015000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:50 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000010e94200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:50 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00007a0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:50 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) tkill(r1, 0x9) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x20800) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES64=0x0], 0x1}}, 0x50) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) syz_genetlink_get_family_id$wireguard(&(0x7f0000000140)='wireguard\x00') sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xffffff97}, 0x0) [ 2751.297901][T31554] ldm_validate_privheads(): Disk read failed. [ 2751.329450][T31554] loop4: p2 < > [ 2751.340773][T31554] loop4: partition table partially beyond EOD, truncated [ 2751.362596][T31554] loop4: p2 size 2 extends beyond EOD, truncated [ 2751.502511][T31555] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:18:51 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/125) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000140)={0x8, 0x1, 0x4, 0x8, 0x0, {0x0, 0x7530}, {0x3, 0xe1cd2562db2379e9, 0x6, 0x9, 0x6, 0x0, "000016d1"}, 0x1ff, 0x3, @planes=&(0x7f0000000000)={0x3f, 0x4, @userptr=0x9, 0x4}, 0x8, 0x0, r4}) ioctl$PPPIOCDISCONN(r5, 0x7439) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500ffffffee4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2751.622382][T31555] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2751.651848][T31555] loop5: p2 < > 23:18:51 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000810000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:51 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xffffff88}, 0x0) 23:18:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x2900, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2751.841446][T31580] ldm_validate_privheads(): Disk read failed. [ 2751.847723][T31580] Dev loop4: unable to read RDB block 1 [ 2751.918781][T31580] loop4: unable to read partition table 23:18:51 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000)={0x1ff}, 0x4) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2752.000086][T31580] loop4: partition table beyond EOD, truncated [ 2752.050443][T31580] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:51 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xffffff84}, 0x0) 23:18:51 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000016000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:51 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f00000001c0)) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x676800, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r5, 0x111, 0x3, 0x0, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r7 = fcntl$getown(0xffffffffffffffff, 0x9) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x208000, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r7, 0x4, 0xffffffffffffffff, 0x8) sched_setaffinity(r7, 0x8, &(0x7f0000000000)=0x2) 23:18:51 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00018a0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:51 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fffffff54200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2752.379118][T31612] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2752.459857][T31612] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:18:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x97ffffff}, 0x0) [ 2752.528408][T31625] ldm_validate_privheads(): Disk read failed. [ 2752.550711][T31612] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:18:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x2b00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2752.591450][T31625] Dev loop4: unable to read RDB block 1 [ 2752.597085][T31625] loop4: unable to read partition table [ 2752.603081][T31625] loop4: partition table beyond EOD, truncated [ 2752.609310][T31625] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:52 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2752.680039][T31621] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2752.749180][T31621] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2752.759290][T31621] loop5: p2 < > 23:18:52 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fffffff64200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x88ffffff}, 0x0) 23:18:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00028e0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:52 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000017000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2753.021085][T31649] ldm_validate_privheads(): Disk read failed. [ 2753.027323][T31649] Dev loop4: unable to read RDB block 1 [ 2753.067129][T31649] loop4: unable to read partition table [ 2753.073057][T31649] loop4: partition table beyond EOD, truncated [ 2753.090549][T31649] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x88ffffff}, 0x0) 23:18:52 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x160e00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7000000000011905030100000800000002240001001400010008000100ffffffff08000200ac1e00010c00ea000000010000000000240002000c00890f05000100000000001400010008000100000094bd2f2d22390b17e000080208001c000000000008000700a1000020000c000600080001007f0000015241d9928a4a72b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72f81ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414f0100000000000000783a01e148d741823f51a6be4f02367aadd861caf92bd7a0907771b9666d5e78918dd8bd5cd951d38b26f96d33e1c46fb9176438ae530e5220caf4366c0a7fdd6a0000000000000000000000000cb2cb78ab90ad3200360f7c053581107801fde7a0deae4cad0f25ae38a35707491f1966646c4674d7a17060b6590087e66809864a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000900000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:52 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fffffdfd4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x2c00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2753.646349][T31667] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2753.718465][T31667] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:18:53 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3f800, 0x101100) ioctl$LOOP_SET_FD(r1, 0x4c06, r0) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2753.798988][T31667] loop5: p2 < > [ 2753.816647][T31684] ldm_validate_privheads(): Disk read failed. [ 2753.840956][T31684] Dev loop4: unable to read RDB block 1 [ 2753.881418][T31684] loop4: unable to read partition table [ 2753.887296][T31684] loop4: partition table beyond EOD, truncated [ 2753.950231][T31684] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:53 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000018000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x88ffffff}, 0x0) 23:18:53 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fffffffd4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:53 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00019a0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x7fffef90}, 0x0) [ 2754.395103][T31720] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2754.426688][T31720] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:18:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x2f00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2754.446698][T31725] ldm_validate_privheads(): Disk read failed. [ 2754.470490][T31725] Dev loop4: unable to read RDB block 1 [ 2754.480452][T31725] loop4: unable to read partition table [ 2754.486866][T31720] loop5: p2 < > [ 2754.490693][T31725] loop4: partition table beyond EOD, truncated [ 2754.521462][T31725] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:54 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r12 = geteuid() r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r14}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = accept4$bt_l2cap(r17, &(0x7f0000000580), &(0x7f00000005c0)=0xe, 0x0) r19 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000600)='/dev/nvram\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = fcntl$dupfd(r21, 0x0, r20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r24, 0x0, r23) r25 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r25, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r25, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r25, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r25, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r25, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r25, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r26 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/pid_for_children\x00') r27 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dlm_plock\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r30 = fcntl$dupfd(r29, 0x0, r28) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) r31 = getpid() r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r33, 0x0) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000840)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000002f80)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r35, @ANYBLOB="f155ae793f390c693a406611f1bd2eb9d2f2c1a3049dad74cef9e7ccc1be61ef4685d1be3fbc", @ANYRES32=0x0, @ANYBLOB="10000200000000002000020000000000"], 0x34, 0x0) r36 = getegid() ioctl$DRM_IOCTL_GET_CLIENT(r7, 0xc0286405, &(0x7f0000000880)={0x1, 0x5, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x6b5, 0x1}) r38 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r39, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) r41 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r41, 0x4, 0xffffffffffffffff, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r42}], {0x4, 0x2}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) r43 = getgid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r45, 0x0, r44) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000fc0)=0x0) r47 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r48, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001000)='./file0\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r52 = fcntl$dupfd(r51, 0x0, r50) ioctl$PERF_EVENT_IOC_ENABLE(r52, 0x8912, 0x400200) r53 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r53, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r53, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r53, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r53, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r53, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r53, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r54 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r54, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r54, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r54, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r54, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r54, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r54, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r55 = socket$caif_stream(0x25, 0x1, 0x3) r56 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r56, 0x4, 0xffffffffffffffff, 0x8) r57 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r57, 0x4, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000001280)={0x4200000, &(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0, {0x39}, &(0x7f0000001180)=""/85, 0x55, &(0x7f0000001200), &(0x7f0000001240)=[0xffffffffffffffff, r56, 0x0, 0x0, 0xffffffffffffffff, 0x0, r57, 0xffffffffffffffff, 0xffffffffffffffff], 0x9}, 0x50) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) r60 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r61}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r63, 0x0, r62) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r65, 0x0, r64) r66 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r66, 0x4, 0xffffffffffffffff, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) r68 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r68, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r69}}]}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r67}], {0x4, 0x2}, [{0x8, 0x0, r69}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r73 = fcntl$dupfd(r72, 0x0, r71) ioctl$PERF_EVENT_IOC_ENABLE(r73, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r76 = fcntl$dupfd(r75, 0x0, r74) ioctl$PERF_EVENT_IOC_ENABLE(r76, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r78, 0x0, r77) r79 = gettid() r80 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r80, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r81, 0x0) r82 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r82, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r83}}]}) r84 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r85}], {0x4, 0x2}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r88 = fcntl$dupfd(r87, 0x0, r86) ioctl$PERF_EVENT_IOC_ENABLE(r88, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)=0x0) fstat(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e40)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="75ad4e1f05b01207a4b77eb3b7d9b7ebc8d573b9ba1fdf671b7d2e6a934d1267dcdf9009da34f72e", 0x28}, {&(0x7f00000002c0)="08a99a8c97bc518f7d663720166ddd9bfde447d5059286384b9d14074614f4480b4de1b1f1d66fa5c9082f68146dc56a8c900d6f6493e5c68eb24e15eff498027533b0b0", 0x44}, {&(0x7f0000000340)="80b93482f93aa2b5056562ec05faabd594cda2c1e59402db1a5bc3b0721299165fd14a255e12ceff225482a4847a0d33a5a54ed3dad4d7827e1fa87758bf8f78e97ae29a8152a4f47ade881485e0a9f53a4ee54b5c36d3b42f9a13f7e5da5099dc1b6ec0a00259be2dd10ddffdd3801aa3f75d05a5652ff128288cc66951860fee6ddec43c363c26e519fa6dcc35016453d407938108b311f9b07018212a81fd4250", 0xa2}], 0x3, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r14}}}], 0x20, 0x4000}, {&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r18, @ANYRES32, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r24, @ANYRES32=r7, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r25, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r30, @ANYRES32=r2, @ANYBLOB="1c004000000000000100000002000000", @ANYRES32=r31, @ANYRES32=r33, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r34, @ANYRES32=r35, @ANYRES32=r36, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r37, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r41, @ANYRES32=r42, @ANYRES32=r43, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r44, @ANYBLOB="0000000010000000000000000100000001000000"], 0x130, 0x800}, {&(0x7f0000000ac0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000b40)="97e171c6dcb59cb4ceb5e1f6bb1a991ccb6db6fe8bb585ab28f9ab4a7b6019f79b943500a2ed60617d6e30f9db430216aab5ae5f7303721d2baae071c84f9d2cb328bea6d8cd08e443ffc4d8838881d7e26b2aa7e0c2a32e85727efe24676a8610120a2464563c92e2bebb00cf4e59b68d92326e396e9456acb3fd38980eebcccddaf747", 0x84}, {&(0x7f0000000c00)="bcfb22a0807439ee39a49d2e331c6c30c41a5f9db91ba956a62512e1079337f861dfa75e9f1a37a9bb57427d37cc1f0525860ced4bccb95926df946c80454fed392c59814044ec1b530baa596c898a6bd80576a186b98d1293b95d4ecf80986c383100ae91b9ba85f57bfcfdf4e7d8a57ad54f13f441becfdeee56a28611b9d044a6bfe2fe1cda5fb5875a6bde99f29049a294bffafcadbcf645bf8a", 0x9c}, {&(0x7f0000000cc0)="606d4ee2265df82514f6ca3f77d86ecacc1f1a8093c4faec91ebef542f57e59641e89be80dd488fa17323b00a62ff9e02cc25c898fa65880d6f0503e301e8fb13844fbc4a1439c274e676c6ea18734d31acf06c326f386abace3aa0478ac90400b37c16341fb05fae2aae348125109", 0x6f}, {&(0x7f0000000d40)="c9987490cb437f21567a82853c51e303467a13978ad621627fbc5f9cb92817db022eaf149bc96b365d89a5732699254f31495699c561ab779fb4a4467edd8b15bd5a757c121743ad1f7cb21c496489169c345ee21f4ec739ce804ed635cb678637b1266b858d2ecb8036c5c8c497c294aafe239dda67dc0742c6f084bce2f6a11ef550a4f13e466560b5cd132e9780fc6805b7a60a74fc04c4afefba24f68d328d1ec7c4c3c1f166b7", 0xa9}, {&(0x7f0000000e00)="1b56737fbe56833f0e5c4b1870674063cb315694d502bfac11fb7eaf14adc783e49694fa773e7f4ac0f29da15d073cbbd3155c603ea60e1ca3b61fe9fca26f43749534983e37bd013689c256995963ebaf025d37e2a2d5094ba22795d2a1efeb1f1104e5a98e71f8194d1b618c81226247e0806875c57838fff45d327489e0c3f3f6bbf99abd2f7f62f480f8c890f8dfe2bbefd1032e81eea7b1", 0x9a}, {&(0x7f0000000ec0)="97fbe90a1a9986385edbe9b50050e74a4eafce887a29a3753aed7a8b75f4ec4cb087e20e2e2d462d955140a32f48860dfd6d91e8cabc49a09849f056338ebb9caf4736d3aa1c22fa9f3594910d92510fba", 0x51}], 0x6, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r46, r48, r49}}}, @rights={{0x20, 0x1, 0x1, [r52, 0xffffffffffffffff, r4, r53]}}, @rights={{0x14, 0x1, 0x1, [r54]}}, @rights={{0x18, 0x1, 0x1, [r55, r5]}}, @cred={{0x1c, 0x1, 0x2, {r58, r59, r61}}}, @rights={{0x1c, 0x1, 0x1, [r0, r63, r65]}}], 0xb0, 0x4040}, {&(0x7f0000001480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001980)=[{&(0x7f0000001500)="93467acd885d43f3ded54ddbb766e5fd4b1a9719e10b464839fdbdcfa886b3b80bde95cb96", 0x25}, {&(0x7f0000001540)="75551844e2a41900031a85ec66b35cca56784b1de5dfa56989c39f85ce8840a2c4656b80b735b02737125a628d7d56a505661335f076f44a103f1d1598c63b6d01fe9beb6b07fe162d56b9352571063c6a573ddbb67d0a9c412a97672ed97f4d70655380b7549182259451e480365ac2d1e33340491dececf47457f9c6281e8f72c2e85e96b4229fd3127467b2c2fe3a34911f9632511a211532e2e869b12f60de5907f0d14f005a4117931922a4fb24c4564900e0687bc315df1d31b199acdce487e163c774bad99f0ee6308c6af9b4c81b6d18d7bfdb14771608d77c21f2801428513393d174edde576e", 0xeb}, {&(0x7f0000001640)="c9d44b829241d95223676fcabb", 0xd}, {&(0x7f0000001680)="a9f9ecba6c345d01cf8c3f0bd94c48dfac81ef544fb4ec7bb7d6db8dda0a1f025a9c337eea48abaed95fdf606a0ed8c6ec56659f4a55d0ac748a1be076852db79d0325d865790e1bd08762329850ebd2da94a8dec1dca4df52adb4bf4c021d1e4a3576d4c1088ff543bb0c", 0x6b}, {&(0x7f0000001700)="0dd8516e37fcf5a2be74d0d6923c3f5b15bd", 0x12}, {&(0x7f0000001740)="12f595fd5e8f0ebbdc5b0502bb3e2bdd11802770625dba189edbe14e275ec9e84f218f909d31bd169da49adb106a22fcb509302885d598a0bf7577cd9e", 0x3d}, {&(0x7f0000001780)="c5de45275d67b06921c2040f98fb2d30f33441101e0dc1f705415d6cba1fb066f43452199662527a7252a3b680c480b39c288dc66c52c80149047413d75bf280fc77b47de6726100d36d31d440359c68059f85f5ab3611660e3816771e0ea3ac1351e4a5936d122b94d07844adb4e5166779c336dad36da55a2df36c1cbacb2cb37b02bcb5a9bfa4b2fa57917400d601e3a70effc2d3dc65f8fe2e305bbe50e9c122a380bde055c839acb2b67ae8a0aec1f2a7e7345fcc7eacff169a4d", 0xbd}, {&(0x7f0000001840)="a37dacd76f9c07e8ec9ecdd96c62b68e5148e50cf2a99f4ed9f1f4cc3d29402a78fdeb2e6f798a10d1d400525564c820262ad80c9b3a72e8ae05d2735b5ddb885036c184b908fb2df2a3f6ae27600842f005286213495c24c11b882d2d276ef01852caf533bee0d36b6df31f6bf45442858b67a333b777855c5abc54e6e0a2daba8dfadcc7c794df946327180efb2048c9fd581df9a988411e051eca811c1a24496866f9b085d6204c3ec58171d3d6be1a2b29a381a7e529346c4c9a362dc90e689a0d94aac8b2c4139ff70036f0064dbef55454", 0xd4}, {&(0x7f0000001940)="8a5faa2bc33b6eec916d17040fce4e13e83f44460edcddad", 0x18}], 0x9, &(0x7f0000001b00)=[@cred={{0x1c, 0x1, 0x2, {r66, r67, r70}}}, @rights={{0x14, 0x1, 0x1, [r73]}}, @rights={{0x1c, 0x1, 0x1, [r76, r1, r78]}}, @cred={{0x1c, 0x1, 0x2, {r79, r81, r83}}}, @cred={{0x1c, 0x1, 0x2, {r84, r85, 0xee00}}}], 0x98, 0x4040000}, {&(0x7f0000001bc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001c40)="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", 0x1000}], 0x1, &(0x7f0000002e00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r88, r4]}}, @cred={{0x1c, 0x1, 0x2, {r89, r90, r91}}}], 0x40, 0x8000}], 0x5, 0x8) setsockopt$sock_int(r6, 0x1, 0x2c, &(0x7f0000000000)=0x8000, 0x4) r92 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r92, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r92, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x40000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x64}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r93 = getpid() tkill(r93, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r94 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x2) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r94, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:54 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000fff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:54 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000b60000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:54 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000019000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2755.153604][T31754] ldm_validate_privheads(): Disk read failed. [ 2755.159999][T31754] loop4: p2 < > 23:18:54 executing program 3: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000004000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:54 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x8) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22880, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000003f0a9aaaaaaaabbffffffffffff0180c2000002"]) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2755.211886][T31758] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2755.302994][T31758] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2755.323489][T31754] loop4: partition table partially beyond EOD, truncated [ 2755.331213][T31754] loop4: p2 size 2 extends beyond EOD, truncated [ 2755.335831][T31758] loop5: p2 < > 23:18:54 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000be0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:54 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:54 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500ffffefff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2755.533801][T31774] ldm_validate_privheads(): Disk read failed. [ 2755.552556][T31774] loop3: p2 < > [ 2755.556202][T31774] loop3: partition table partially beyond EOD, truncated 23:18:55 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2755.609166][T31774] loop3: p2 size 2 extends beyond EOD, truncated 23:18:55 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0001c20000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x3a00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2755.854465][T31788] ldm_validate_privheads(): Disk read failed. [ 2755.895802][T31788] Dev loop4: unable to read RDB block 1 [ 2755.952282][T31786] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2755.986697][T31788] loop4: unable to read partition table [ 2756.028118][T31788] loop4: partition table beyond EOD, truncated [ 2756.067104][T31786] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:18:55 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) r12 = geteuid() r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r14}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = accept4$bt_l2cap(r17, &(0x7f0000000580), &(0x7f00000005c0)=0xe, 0x0) r19 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000600)='/dev/nvram\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = fcntl$dupfd(r21, 0x0, r20) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r24, 0x0, r23) r25 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r25, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r25, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r25, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r25, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r25, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r25, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r26 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/pid_for_children\x00') r27 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dlm_plock\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r30 = fcntl$dupfd(r29, 0x0, r28) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) r31 = getpid() r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r33, 0x0) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000840)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000002f80)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r35, @ANYBLOB="f155ae793f390c693a406611f1bd2eb9d2f2c1a3049dad74cef9e7ccc1be61ef4685d1be3fbc", @ANYRES32=0x0, @ANYBLOB="10000200000000002000020000000000"], 0x34, 0x0) r36 = getegid() ioctl$DRM_IOCTL_GET_CLIENT(r7, 0xc0286405, &(0x7f0000000880)={0x1, 0x5, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x6b5, 0x1}) r38 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r39, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) r41 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r41, 0x4, 0xffffffffffffffff, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r22, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r42}], {0x4, 0x2}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) r43 = getgid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r45, 0x0, r44) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000fc0)=0x0) r47 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r48, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001000)='./file0\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r52 = fcntl$dupfd(r51, 0x0, r50) ioctl$PERF_EVENT_IOC_ENABLE(r52, 0x8912, 0x400200) r53 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r53, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r53, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r53, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r53, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r53, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r53, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r54 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r54, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r54, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r54, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r54, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r54, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r54, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r55 = socket$caif_stream(0x25, 0x1, 0x3) r56 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r56, 0x4, 0xffffffffffffffff, 0x8) r57 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r57, 0x4, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000001280)={0x4200000, &(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0, {0x39}, &(0x7f0000001180)=""/85, 0x55, &(0x7f0000001200), &(0x7f0000001240)=[0xffffffffffffffff, r56, 0x0, 0x0, 0xffffffffffffffff, 0x0, r57, 0xffffffffffffffff, 0xffffffffffffffff], 0x9}, 0x50) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) r60 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r61}}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r63, 0x0, r62) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r65, 0x0, r64) r66 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r66, 0x4, 0xffffffffffffffff, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) r68 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r68, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r69}}]}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x3}, [{0x2, 0x0, r67}], {0x4, 0x2}, [{0x8, 0x0, r69}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r73 = fcntl$dupfd(r72, 0x0, r71) ioctl$PERF_EVENT_IOC_ENABLE(r73, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r76 = fcntl$dupfd(r75, 0x0, r74) ioctl$PERF_EVENT_IOC_ENABLE(r76, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r78, 0x0, r77) r79 = gettid() r80 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r80, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r81, 0x0) r82 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r82, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r83}}]}) r84 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r85}], {0x4, 0x2}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x34, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r88 = fcntl$dupfd(r87, 0x0, r86) ioctl$PERF_EVENT_IOC_ENABLE(r88, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)=0x0) fstat(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e40)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="75ad4e1f05b01207a4b77eb3b7d9b7ebc8d573b9ba1fdf671b7d2e6a934d1267dcdf9009da34f72e", 0x28}, {&(0x7f00000002c0)="08a99a8c97bc518f7d663720166ddd9bfde447d5059286384b9d14074614f4480b4de1b1f1d66fa5c9082f68146dc56a8c900d6f6493e5c68eb24e15eff498027533b0b0", 0x44}, {&(0x7f0000000340)="80b93482f93aa2b5056562ec05faabd594cda2c1e59402db1a5bc3b0721299165fd14a255e12ceff225482a4847a0d33a5a54ed3dad4d7827e1fa87758bf8f78e97ae29a8152a4f47ade881485e0a9f53a4ee54b5c36d3b42f9a13f7e5da5099dc1b6ec0a00259be2dd10ddffdd3801aa3f75d05a5652ff128288cc66951860fee6ddec43c363c26e519fa6dcc35016453d407938108b311f9b07018212a81fd4250", 0xa2}], 0x3, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r14}}}], 0x20, 0x4000}, {&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r18, @ANYRES32, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r24, @ANYRES32=r7, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r25, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r30, @ANYRES32=r2, @ANYBLOB="1c004000000000000100000002000000", @ANYRES32=r31, @ANYRES32=r33, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r34, @ANYRES32=r35, @ANYRES32=r36, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r37, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r41, @ANYRES32=r42, @ANYRES32=r43, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r44, @ANYBLOB="0000000010000000000000000100000001000000"], 0x130, 0x800}, {&(0x7f0000000ac0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000b40)="97e171c6dcb59cb4ceb5e1f6bb1a991ccb6db6fe8bb585ab28f9ab4a7b6019f79b943500a2ed60617d6e30f9db430216aab5ae5f7303721d2baae071c84f9d2cb328bea6d8cd08e443ffc4d8838881d7e26b2aa7e0c2a32e85727efe24676a8610120a2464563c92e2bebb00cf4e59b68d92326e396e9456acb3fd38980eebcccddaf747", 0x84}, {&(0x7f0000000c00)="bcfb22a0807439ee39a49d2e331c6c30c41a5f9db91ba956a62512e1079337f861dfa75e9f1a37a9bb57427d37cc1f0525860ced4bccb95926df946c80454fed392c59814044ec1b530baa596c898a6bd80576a186b98d1293b95d4ecf80986c383100ae91b9ba85f57bfcfdf4e7d8a57ad54f13f441becfdeee56a28611b9d044a6bfe2fe1cda5fb5875a6bde99f29049a294bffafcadbcf645bf8a", 0x9c}, {&(0x7f0000000cc0)="606d4ee2265df82514f6ca3f77d86ecacc1f1a8093c4faec91ebef542f57e59641e89be80dd488fa17323b00a62ff9e02cc25c898fa65880d6f0503e301e8fb13844fbc4a1439c274e676c6ea18734d31acf06c326f386abace3aa0478ac90400b37c16341fb05fae2aae348125109", 0x6f}, {&(0x7f0000000d40)="c9987490cb437f21567a82853c51e303467a13978ad621627fbc5f9cb92817db022eaf149bc96b365d89a5732699254f31495699c561ab779fb4a4467edd8b15bd5a757c121743ad1f7cb21c496489169c345ee21f4ec739ce804ed635cb678637b1266b858d2ecb8036c5c8c497c294aafe239dda67dc0742c6f084bce2f6a11ef550a4f13e466560b5cd132e9780fc6805b7a60a74fc04c4afefba24f68d328d1ec7c4c3c1f166b7", 0xa9}, {&(0x7f0000000e00)="1b56737fbe56833f0e5c4b1870674063cb315694d502bfac11fb7eaf14adc783e49694fa773e7f4ac0f29da15d073cbbd3155c603ea60e1ca3b61fe9fca26f43749534983e37bd013689c256995963ebaf025d37e2a2d5094ba22795d2a1efeb1f1104e5a98e71f8194d1b618c81226247e0806875c57838fff45d327489e0c3f3f6bbf99abd2f7f62f480f8c890f8dfe2bbefd1032e81eea7b1", 0x9a}, {&(0x7f0000000ec0)="97fbe90a1a9986385edbe9b50050e74a4eafce887a29a3753aed7a8b75f4ec4cb087e20e2e2d462d955140a32f48860dfd6d91e8cabc49a09849f056338ebb9caf4736d3aa1c22fa9f3594910d92510fba", 0x51}], 0x6, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r46, r48, r49}}}, @rights={{0x20, 0x1, 0x1, [r52, 0xffffffffffffffff, r4, r53]}}, @rights={{0x14, 0x1, 0x1, [r54]}}, @rights={{0x18, 0x1, 0x1, [r55, r5]}}, @cred={{0x1c, 0x1, 0x2, {r58, r59, r61}}}, @rights={{0x1c, 0x1, 0x1, [r0, r63, r65]}}], 0xb0, 0x4040}, {&(0x7f0000001480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001980)=[{&(0x7f0000001500)="93467acd885d43f3ded54ddbb766e5fd4b1a9719e10b464839fdbdcfa886b3b80bde95cb96", 0x25}, {&(0x7f0000001540)="75551844e2a41900031a85ec66b35cca56784b1de5dfa56989c39f85ce8840a2c4656b80b735b02737125a628d7d56a505661335f076f44a103f1d1598c63b6d01fe9beb6b07fe162d56b9352571063c6a573ddbb67d0a9c412a97672ed97f4d70655380b7549182259451e480365ac2d1e33340491dececf47457f9c6281e8f72c2e85e96b4229fd3127467b2c2fe3a34911f9632511a211532e2e869b12f60de5907f0d14f005a4117931922a4fb24c4564900e0687bc315df1d31b199acdce487e163c774bad99f0ee6308c6af9b4c81b6d18d7bfdb14771608d77c21f2801428513393d174edde576e", 0xeb}, {&(0x7f0000001640)="c9d44b829241d95223676fcabb", 0xd}, {&(0x7f0000001680)="a9f9ecba6c345d01cf8c3f0bd94c48dfac81ef544fb4ec7bb7d6db8dda0a1f025a9c337eea48abaed95fdf606a0ed8c6ec56659f4a55d0ac748a1be076852db79d0325d865790e1bd08762329850ebd2da94a8dec1dca4df52adb4bf4c021d1e4a3576d4c1088ff543bb0c", 0x6b}, {&(0x7f0000001700)="0dd8516e37fcf5a2be74d0d6923c3f5b15bd", 0x12}, {&(0x7f0000001740)="12f595fd5e8f0ebbdc5b0502bb3e2bdd11802770625dba189edbe14e275ec9e84f218f909d31bd169da49adb106a22fcb509302885d598a0bf7577cd9e", 0x3d}, {&(0x7f0000001780)="c5de45275d67b06921c2040f98fb2d30f33441101e0dc1f705415d6cba1fb066f43452199662527a7252a3b680c480b39c288dc66c52c80149047413d75bf280fc77b47de6726100d36d31d440359c68059f85f5ab3611660e3816771e0ea3ac1351e4a5936d122b94d07844adb4e5166779c336dad36da55a2df36c1cbacb2cb37b02bcb5a9bfa4b2fa57917400d601e3a70effc2d3dc65f8fe2e305bbe50e9c122a380bde055c839acb2b67ae8a0aec1f2a7e7345fcc7eacff169a4d", 0xbd}, {&(0x7f0000001840)="a37dacd76f9c07e8ec9ecdd96c62b68e5148e50cf2a99f4ed9f1f4cc3d29402a78fdeb2e6f798a10d1d400525564c820262ad80c9b3a72e8ae05d2735b5ddb885036c184b908fb2df2a3f6ae27600842f005286213495c24c11b882d2d276ef01852caf533bee0d36b6df31f6bf45442858b67a333b777855c5abc54e6e0a2daba8dfadcc7c794df946327180efb2048c9fd581df9a988411e051eca811c1a24496866f9b085d6204c3ec58171d3d6be1a2b29a381a7e529346c4c9a362dc90e689a0d94aac8b2c4139ff70036f0064dbef55454", 0xd4}, {&(0x7f0000001940)="8a5faa2bc33b6eec916d17040fce4e13e83f44460edcddad", 0x18}], 0x9, &(0x7f0000001b00)=[@cred={{0x1c, 0x1, 0x2, {r66, r67, r70}}}, @rights={{0x14, 0x1, 0x1, [r73]}}, @rights={{0x1c, 0x1, 0x1, [r76, r1, r78]}}, @cred={{0x1c, 0x1, 0x2, {r79, r81, r83}}}, @cred={{0x1c, 0x1, 0x2, {r84, r85, 0xee00}}}], 0x98, 0x4040000}, {&(0x7f0000001bc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001c40)="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", 0x1000}], 0x1, &(0x7f0000002e00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r88, r4]}}, @cred={{0x1c, 0x1, 0x2, {r89, r90, r91}}}], 0x40, 0x8000}], 0x5, 0x8) setsockopt$sock_int(r6, 0x1, 0x2c, &(0x7f0000000000)=0x8000, 0x4) r92 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r92, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r92, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x40000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x64}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r93 = getpid() tkill(r93, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r94 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x2) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r94, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2756.083194][T31788] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2756.092259][T31786] loop5: p2 < > 23:18:55 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r5, 0xc06c4124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:55 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000f0ff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:55 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001b000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:55 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0001c40000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:56 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000000)=""/60) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2756.551276][T31815] ldm_validate_privheads(): Disk read failed. [ 2756.560253][T31815] loop4: p2 < > [ 2756.573160][T31815] loop4: partition table partially beyond EOD, truncated [ 2756.601506][T31815] loop4: p2 size 2 extends beyond EOD, truncated 23:18:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r5, 0xc06c4124, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:56 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000fffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x3c00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:18:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x7f000001}, 0x0) [ 2756.907686][T31824] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2756.951685][T31831] ldm_validate_privheads(): Disk read failed. [ 2756.958013][T31824] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2756.966876][T31824] loop5: p2 < > [ 2757.010800][T31831] loop4: p2 < > [ 2757.041365][T31831] loop4: partition table partially beyond EOD, truncated [ 2757.137385][T31831] loop4: p2 size 2 extends beyond EOD, truncated 23:18:56 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:56 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0001e40000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:56 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500ffefffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:56 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000608080001007f0000015241d9928a4672b0c20bb127590fc89e9c23c07d3acaebcf3e6df10de3e41b317636dcbeb20eb59346e47f0a3f1cd4ce77c76e72fc1ddf1e3f00000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf43622e5be97feefdc4103d8817167897d43bd672bd36367460324c7d47815ef4e908a041920aefd0abc16ad9469cad7578b43c7118533d333bc7ecf046639750d58b51abc0f1852e82d4a056cfa483819a6062c071a6c98809e19413d7fa8bda7d45b53a6313d66c273e5e74814c13f138bd8c8627141cd4f543212f54eeb7b7b3134133e33eb0000"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:56 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001b000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2757.576442][T31855] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2757.627996][T31855] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2757.661934][T31863] ldm_validate_privheads(): Disk read failed. [ 2757.677579][T31855] loop5: p2 < > [ 2757.681047][T31863] Dev loop4: unable to read RDB block 1 [ 2757.705007][T31863] loop4: unable to read partition table [ 2757.726711][T31863] loop4: partition table beyond EOD, truncated [ 2757.756094][T31863] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x3f00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:18:57 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4004084) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 23:18:57 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fdfdffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2758.007562][T31872] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2758.030623][T31872] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2758.052483][T31872] loop3: p2 < > 23:18:57 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0003e60000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:57 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001d000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:57 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001b000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:57 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x142, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="364ad6231ab402bb52ff06a860065cc0ea6002fef3c3aee80525394b77671195ce3b2a18226f33f520378adfd0c724025a3d0556c1e5fa43bcc10dd30c3de5999d7b127986f8edb7e2ca3cd313d9cc2c391673969d1e27936040cc6129ccfe7e50574c6df022f1cca4b293e46fa26ac14244da0f6e950b1d9ab6608534978055c29717af4747e0ce6cd7e3038a13fffb406b86b028e592baaab5d648e96329f241560ba02c9fa86581a1d82fa4b9371da1455455935f4258e42af396112d04c6aa1a95b41189eadc4785dab27d6d92fc7477872678221821b70446b1a7546bed794c460b84303a643227b8f014cef1d07834a64c3b0c11b68f1ba07d29cf0e7f") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf0, 0x9, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x58, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'bond0\x00'}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @loopback}}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x80}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x40}]}, 0xf0}, 0x1, 0x0, 0x0, 0x40800}, 0x800) tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2758.395599][T31897] ldm_validate_privheads(): Disk read failed. [ 2758.410596][T31897] Dev loop4: unable to read RDB block 1 [ 2758.427417][T31897] loop4: unable to read partition table [ 2758.443785][T31897] loop4: partition table beyond EOD, truncated [ 2758.475084][T31905] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2758.479348][T31897] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2758.493157][T31905] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2758.509123][T31905] loop5: p2 < > 23:18:58 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0010e90000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:58 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:18:58 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001e000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:58 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005007fffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2758.820547][T31924] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:18:58 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0003ec0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2758.913225][T31924] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2758.923214][T31924] loop3: p2 < > [ 2758.975251][T31931] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:18:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x4800, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2759.070614][T31941] ldm_validate_privheads(): Disk read failed. [ 2759.103605][T31931] CPU: 1 PID: 31931 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 23:18:58 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x142, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="364ad6231ab402bb52ff06a860065cc0ea6002fef3c3aee80525394b77671195ce3b2a18226f33f520378adfd0c724025a3d0556c1e5fa43bcc10dd30c3de5999d7b127986f8edb7e2ca3cd313d9cc2c391673969d1e27936040cc6129ccfe7e50574c6df022f1cca4b293e46fa26ac14244da0f6e950b1d9ab6608534978055c29717af4747e0ce6cd7e3038a13fffb406b86b028e592baaab5d648e96329f241560ba02c9fa86581a1d82fa4b9371da1455455935f4258e42af396112d04c6aa1a95b41189eadc4785dab27d6d92fc7477872678221821b70446b1a7546bed794c460b84303a643227b8f014cef1d07834a64c3b0c11b68f1ba07d29cf0e7f") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf0, 0x9, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x58, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'bond0\x00'}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @loopback}}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x80}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x58, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x40}]}, 0xf0}, 0x1, 0x0, 0x0, 0x40800}, 0x800) tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2759.113160][T31931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.123203][T31931] Call Trace: [ 2759.126496][T31931] dump_stack+0x197/0x210 [ 2759.130845][T31931] dump_header+0x177/0x1152 [ 2759.135366][T31931] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2759.141166][T31931] ? ___ratelimit+0x2c8/0x595 [ 2759.145847][T31931] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2759.151666][T31931] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2759.154240][T31941] Dev loop4: unable to read RDB block 1 [ 2759.156957][T31931] ? trace_hardirqs_on+0x67/0x240 [ 2759.156982][T31931] ? pagefault_out_of_memory+0x11c/0x11c [ 2759.157002][T31931] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2759.157021][T31931] ? ___ratelimit+0x60/0x595 [ 2759.157034][T31931] ? do_raw_spin_unlock+0x181/0x270 [ 2759.157057][T31931] oom_kill_process.cold+0x10/0x15 [ 2759.163235][T31941] loop4: unable to read partition table [ 2759.167592][T31931] out_of_memory+0x334/0x13c0 [ 2759.167605][T31931] ? find_held_lock+0x35/0x130 [ 2759.167629][T31931] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2759.167651][T31931] ? oom_killer_disable+0x280/0x280 [ 2759.167683][T31931] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2759.174481][T31941] loop4: partition table beyond EOD, truncated [ 2759.179075][T31931] ? memcg_oom_wake_function+0x700/0x700 [ 2759.179105][T31931] ? do_raw_spin_unlock+0x181/0x270 [ 2759.179125][T31931] ? _raw_spin_unlock+0x28/0x40 [ 2759.179148][T31931] try_charge+0xeb1/0x13e0 [ 2759.179197][T31931] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2759.184139][T31941] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2759.188938][T31931] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2759.188963][T31931] ? mem_cgroup_css_offline+0x330/0x330 [ 2759.188981][T31931] ? __kasan_check_read+0x11/0x20 [ 2759.189012][T31931] mem_cgroup_try_charge+0x136/0x590 [ 2759.189053][T31931] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2759.292232][T31931] wp_page_copy+0x421/0x1610 [ 2759.296831][T31931] ? find_held_lock+0x35/0x130 [ 2759.301606][T31931] ? follow_pfn+0x2a0/0x2a0 [ 2759.306108][T31931] ? lock_downgrade+0x920/0x920 [ 2759.310966][T31931] ? swp_swapcount+0x540/0x540 [ 2759.315740][T31931] ? do_raw_spin_unlock+0x181/0x270 [ 2759.320953][T31931] do_wp_page+0x499/0x1440 [ 2759.325396][T31931] ? finish_mkwrite_fault+0x5c0/0x5c0 [ 2759.330789][T31931] __handle_mm_fault+0x1be9/0x3c20 [ 2759.335915][T31931] ? apply_to_existing_page_range+0x50/0x50 [ 2759.341811][T31931] ? handle_mm_fault+0x292/0xa50 [ 2759.346772][T31931] ? handle_mm_fault+0x7a0/0xa50 [ 2759.351720][T31931] ? __kasan_check_read+0x11/0x20 [ 2759.356753][T31931] handle_mm_fault+0x3b2/0xa50 [ 2759.361533][T31931] do_page_fault+0x545/0x12e1 [ 2759.366238][T31931] page_fault+0x39/0x40 [ 2759.370395][T31931] RIP: 0033:0x40e38b [ 2759.374300][T31931] Code: 74 28 41 8b 07 85 c0 0f 85 f0 00 00 00 41 83 c6 01 48 81 c5 a8 00 00 00 41 83 fe 10 75 d7 bf 11 0e 4c 00 31 c0 e8 35 3a ff ff 45 f8 01 44 89 75 f4 48 89 ef c6 45 15 00 c7 45 fc 00 00 00 00 [ 2759.393904][T31931] RSP: 002b:00007ffef1e63100 EFLAGS: 00010246 [ 2759.399976][T31931] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 00007ffef1e631b8 [ 2759.407947][T31931] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 [ 2759.415921][T31931] RBP: 000000000075bf2c R08: 00007ffef1e631c0 R09: 0000000000760078 [ 2759.423894][T31931] R10: 000000000043adf0 R11: 000000000000000f R12: 000000000075bf20 [ 2759.431865][T31931] R13: 0000000000000004 R14: 0000000000000000 R15: 000000000075bf2c [ 2759.474782][T31936] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2759.485408][T31931] memory: usage 307200kB, limit 307200kB, failcnt 7602 23:18:59 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050097ffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2759.524611][T31936] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2759.542992][T31931] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2759.561734][T31936] loop5: p2 < > 23:18:59 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0003fe0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2759.693450][T31931] Memory cgroup stats for /syz2: [ 2759.693567][T31931] anon 252207104 [ 2759.693567][T31931] file 77824 [ 2759.693567][T31931] kernel_stack 8589312 [ 2759.693567][T31931] slab 18128896 [ 2759.693567][T31931] sock 147456 [ 2759.693567][T31931] shmem 0 [ 2759.693567][T31931] file_mapped 0 [ 2759.693567][T31931] file_dirty 0 [ 2759.693567][T31931] file_writeback 0 [ 2759.693567][T31931] anon_thp 218103808 [ 2759.693567][T31931] inactive_anon 135168 [ 2759.693567][T31931] active_anon 252211200 [ 2759.693567][T31931] inactive_file 65536 [ 2759.693567][T31931] active_file 28672 [ 2759.693567][T31931] unevictable 0 [ 2759.693567][T31931] slab_reclaimable 2973696 [ 2759.693567][T31931] slab_unreclaimable 15155200 [ 2759.693567][T31931] pgfault 194634 [ 2759.693567][T31931] pgmajfault 0 [ 2759.693567][T31931] workingset_refault 33 [ 2759.693567][T31931] workingset_activate 0 [ 2759.693567][T31931] workingset_nodereclaim 0 [ 2759.693567][T31931] pgrefill 25370 [ 2759.693567][T31931] pgscan 25040 [ 2759.693567][T31931] pgsteal 225 [ 2759.829529][T31931] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12525,uid=0 [ 2759.846232][T31931] Memory cgroup out of memory: Killed process 12525 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 23:18:59 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001f000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2759.929190][T31965] ldm_validate_privheads(): Disk read failed. [ 2759.937832][T31965] Dev loop4: unable to read RDB block 1 [ 2759.952293][T31965] loop4: unable to read partition table [ 2759.960801][T31965] loop4: partition table beyond EOD, truncated [ 2759.967188][T31965] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:18:59 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500c9ffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:18:59 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_bt_hci(r5, 0x400448e1, &(0x7f00000000c0)="d9027bcdf5e9fd28bf00d4773269caf74d57214b65cad665af164a47c9e279b52be615951744c02e109c379fe8255b67bc73729476de19b18a8637127f6c2750aff36ea00e66d273f0bbce9df5ef7691580ff2d3919a3bd8c671cd5d3d0eed43359e04c7527d70cfc4174f96327207c947733d021d0e89b8aac7ac7b44da52f3ff21de76303bb4b36be2d76e4542e06223") r6 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2760.313358][T31987] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2760.324666][T31987] CPU: 0 PID: 31987 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2760.334225][T31987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.344282][T31987] Call Trace: [ 2760.347583][T31987] dump_stack+0x197/0x210 [ 2760.351927][T31987] dump_header+0x177/0x1152 [ 2760.356434][T31987] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2760.362244][T31987] ? ___ratelimit+0x2c8/0x595 [ 2760.366919][T31987] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2760.372863][T31987] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2760.378180][T31987] ? trace_hardirqs_on+0x67/0x240 [ 2760.383213][T31987] ? pagefault_out_of_memory+0x11c/0x11c [ 2760.388872][T31987] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2760.394688][T31987] ? ___ratelimit+0x60/0x595 [ 2760.399285][T31987] ? do_raw_spin_unlock+0x181/0x270 [ 2760.404543][T31987] oom_kill_process.cold+0x10/0x15 [ 2760.409671][T31987] out_of_memory+0x334/0x13c0 [ 2760.414356][T31987] ? find_held_lock+0x35/0x130 [ 2760.419128][T31987] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2760.424943][T31987] ? oom_killer_disable+0x280/0x280 [ 2760.430168][T31987] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2760.435722][T31987] ? memcg_oom_wake_function+0x700/0x700 [ 2760.441444][T31987] ? do_raw_spin_unlock+0x181/0x270 [ 2760.446655][T31987] ? _raw_spin_unlock+0x28/0x40 [ 2760.451523][T31987] try_charge+0xeb1/0x13e0 [ 2760.455975][T31987] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2760.461534][T31987] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2760.467089][T31987] ? mem_cgroup_css_offline+0x330/0x330 [ 2760.472639][T31987] ? __kasan_check_read+0x11/0x20 [ 2760.477674][T31987] mem_cgroup_try_charge+0x136/0x590 [ 2760.482974][T31987] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2760.488624][T31987] wp_page_copy+0x421/0x1610 [ 2760.493215][T31987] ? find_held_lock+0x35/0x130 [ 2760.497988][T31987] ? follow_pfn+0x2a0/0x2a0 [ 2760.502492][T31987] ? lock_downgrade+0x920/0x920 [ 2760.507357][T31987] ? swp_swapcount+0x540/0x540 [ 2760.512145][T31987] ? do_raw_spin_unlock+0x181/0x270 [ 2760.517360][T31987] do_wp_page+0x499/0x1440 [ 2760.521795][T31987] ? finish_mkwrite_fault+0x5c0/0x5c0 [ 2760.527198][T31987] __handle_mm_fault+0x1be9/0x3c20 [ 2760.532334][T31987] ? apply_to_existing_page_range+0x50/0x50 [ 2760.538234][T31987] ? handle_mm_fault+0x292/0xa50 [ 2760.543197][T31987] ? handle_mm_fault+0x7a0/0xa50 [ 2760.548156][T31987] ? __kasan_check_read+0x11/0x20 [ 2760.553195][T31987] handle_mm_fault+0x3b2/0xa50 [ 2760.557977][T31987] do_page_fault+0x545/0x12e1 [ 2760.562678][T31987] page_fault+0x39/0x40 [ 2760.566836][T31987] RIP: 0033:0x411453 [ 2760.570730][T31987] Code: 6b ca 30 00 48 89 05 5c ca 30 00 c7 05 72 ca 30 00 01 00 00 00 48 c7 05 47 12 66 00 00 00 00 00 c7 05 45 12 66 00 00 00 00 00 05 63 52 66 00 00 00 00 00 c3 49 c7 81 c0 02 00 00 80 26 a7 00 [ 2760.590391][T31987] RSP: 002b:00007ffef1e63258 EFLAGS: 00010202 [ 2760.596466][T31987] RAX: 0000000002161c00 RBX: 00007ffef1e63260 RCX: 0000000000a72680 [ 2760.604440][T31987] RDX: 0000000000000001 RSI: 000000000071de90 RDI: 0000000002161c20 23:19:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x800e, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:00 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0003ec0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:00 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000fff0000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2760.612408][T31987] RBP: 00007ffef1e632a0 R08: 0000000000000001 R09: 0000000002161940 [ 2760.620372][T31987] R10: 0000000002161c10 R11: 0000000000000202 R12: 0000000000000001 [ 2760.628336][T31987] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffef1e632f0 [ 2760.644983][T31987] memory: usage 307200kB, limit 307200kB, failcnt 7631 [ 2760.684516][T31988] ldm_validate_privheads(): Disk read failed. [ 2760.716885][T31988] Dev loop4: unable to read RDB block 1 [ 2760.723680][T31987] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2760.737867][T31988] loop4: unable to read partition table [ 2760.774329][T31983] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2760.799570][T31988] loop4: partition table beyond EOD, truncated [ 2760.806136][T31983] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2760.820589][T31987] Memory cgroup stats for /syz2: [ 2760.820703][T31987] anon 252391424 [ 2760.820703][T31987] file 77824 [ 2760.820703][T31987] kernel_stack 8589312 [ 2760.820703][T31987] slab 18128896 [ 2760.820703][T31987] sock 147456 [ 2760.820703][T31987] shmem 0 [ 2760.820703][T31987] file_mapped 0 [ 2760.820703][T31987] file_dirty 0 [ 2760.820703][T31987] file_writeback 0 [ 2760.820703][T31987] anon_thp 218103808 [ 2760.820703][T31987] inactive_anon 135168 [ 2760.820703][T31987] active_anon 252391424 [ 2760.820703][T31987] inactive_file 65536 [ 2760.820703][T31987] active_file 28672 [ 2760.820703][T31987] unevictable 0 [ 2760.820703][T31987] slab_reclaimable 2973696 [ 2760.820703][T31987] slab_unreclaimable 15155200 [ 2760.820703][T31987] pgfault 194733 [ 2760.820703][T31987] pgmajfault 0 [ 2760.820703][T31987] workingset_refault 33 [ 2760.820703][T31987] workingset_activate 0 [ 2760.820703][T31987] workingset_nodereclaim 0 [ 2760.820703][T31987] pgrefill 25370 [ 2760.820703][T31987] pgscan 25073 [ 2760.820703][T31987] pgsteal 225 [ 2760.846446][T31988] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2760.924196][T31983] loop5: p2 < > 23:19:00 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500e4ffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2761.086536][T32005] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:00 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000020000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2761.181147][T32005] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2761.208893][T32005] loop3: p2 < > [ 2761.230501][T31987] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=31978,uid=0 [ 2761.284322][T31987] Memory cgroup out of memory: Killed process 31978 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2761.412102][T32014] ldm_validate_privheads(): Disk read failed. [ 2761.418257][T32014] Dev loop4: unable to read RDB block 1 23:19:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000180)={0x0, 0x8, 0x3f, &(0x7f0000000140)=0x10001}) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r3, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r5, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r5, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x0, [], [{0x7, 0x7, 0x8001, 0x5, 0x1, 0x100}, {0x9, 0x40000000, 0xfff, 0x8, 0x3}], [[], [], [], [], [], [], [], []]}) tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x200) ioctl$VIDIOC_SUBDEV_S_FMT(r7, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0xfffffffd, 0x0, 0x1014, 0x5, 0x6, 0x3, 0x0, 0x5}}) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0xff00, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2761.511880][T32014] loop4: unable to read partition table [ 2761.517824][T32014] loop4: partition table beyond EOD, truncated 23:19:01 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fa1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2761.601729][T32029] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2761.611989][T32029] CPU: 0 PID: 32029 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2761.621531][T32029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.631591][T32029] Call Trace: [ 2761.634893][T32029] dump_stack+0x197/0x210 [ 2761.639253][T32029] dump_header+0x177/0x1152 [ 2761.643754][T32029] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2761.649554][T32029] ? ___ratelimit+0x2c8/0x595 [ 2761.654233][T32029] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2761.659447][T32014] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2761.660041][T32029] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2761.673291][T32029] ? trace_hardirqs_on+0x67/0x240 [ 2761.678328][T32029] ? pagefault_out_of_memory+0x11c/0x11c [ 2761.683970][T32029] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2761.689784][T32029] ? ___ratelimit+0x60/0x595 [ 2761.694379][T32029] ? do_raw_spin_unlock+0x181/0x270 [ 2761.699591][T32029] oom_kill_process.cold+0x10/0x15 [ 2761.704727][T32029] out_of_memory+0x334/0x13c0 [ 2761.709404][T32029] ? find_held_lock+0x35/0x130 [ 2761.714176][T32029] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2761.719985][T32029] ? oom_killer_disable+0x280/0x280 [ 2761.725188][T32029] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2761.730726][T32029] ? memcg_oom_wake_function+0x700/0x700 [ 2761.736366][T32029] ? do_raw_spin_unlock+0x181/0x270 [ 2761.741563][T32029] ? _raw_spin_unlock+0x28/0x40 [ 2761.746427][T32029] try_charge+0xeb1/0x13e0 [ 2761.750873][T32029] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2761.756424][T32029] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2761.761984][T32029] ? mem_cgroup_css_offline+0x330/0x330 [ 2761.767536][T32029] mem_cgroup_try_charge+0x136/0x590 [ 2761.772830][T32029] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2761.778473][T32029] wp_page_copy+0x421/0x1610 [ 2761.783060][T32029] ? find_held_lock+0x35/0x130 [ 2761.787869][T32029] ? follow_pfn+0x2a0/0x2a0 [ 2761.792376][T32029] ? lock_downgrade+0x920/0x920 [ 2761.797230][T32029] ? swp_swapcount+0x540/0x540 [ 2761.802008][T32029] ? do_raw_spin_unlock+0x181/0x270 [ 2761.807208][T32029] do_wp_page+0x499/0x1440 [ 2761.811630][T32029] ? finish_mkwrite_fault+0x5c0/0x5c0 [ 2761.817017][T32029] __handle_mm_fault+0x1be9/0x3c20 [ 2761.822151][T32029] ? apply_to_existing_page_range+0x50/0x50 [ 2761.828054][T32029] ? handle_mm_fault+0x292/0xa50 [ 2761.833009][T32029] ? handle_mm_fault+0x7a0/0xa50 [ 2761.837958][T32029] ? __kasan_check_read+0x11/0x20 [ 2761.842995][T32029] handle_mm_fault+0x3b2/0xa50 [ 2761.847782][T32029] do_page_fault+0x545/0x12e1 [ 2761.852475][T32029] page_fault+0x39/0x40 [ 2761.856620][T32029] RIP: 0033:0x47353e [ 2761.860509][T32029] Code: ff 90 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 81 ec 28 05 00 00 48 c7 c0 d4 ff ff ff 64 8b 00 <89> 85 5c fb ff ff 8b 87 c0 00 00 00 85 c0 0f 85 ee 00 00 00 c7 87 [ 2761.880108][T32029] RSP: 002b:00007ffef1e62b00 EFLAGS: 00010206 [ 2761.886173][T32029] RAX: 0000000000000006 RBX: 00007ffef1e63060 RCX: 0000000000000000 [ 2761.894143][T32029] RDX: 00007ffef1e631d8 RSI: 00000000004c0e20 RDI: 00007ffef1e63060 23:19:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2761.902102][T32029] RBP: 00007ffef1e63050 R08: 0000000000000000 R09: 00007ffef1e631d8 [ 2761.910065][T32029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef1e63330 [ 2761.918039][T32029] R13: 00000000004c0e20 R14: 00007ffef1e631d8 R15: 0000000000000001 [ 2761.934020][T32029] memory: usage 307200kB, limit 307200kB, failcnt 7656 [ 2761.946589][T32029] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2762.008874][T32029] Memory cgroup stats for /syz2: [ 2762.008995][T32029] anon 252334080 [ 2762.008995][T32029] file 77824 [ 2762.008995][T32029] kernel_stack 8589312 [ 2762.008995][T32029] slab 18128896 [ 2762.008995][T32029] sock 147456 [ 2762.008995][T32029] shmem 0 [ 2762.008995][T32029] file_mapped 0 [ 2762.008995][T32029] file_dirty 0 [ 2762.008995][T32029] file_writeback 0 [ 2762.008995][T32029] anon_thp 218103808 [ 2762.008995][T32029] inactive_anon 135168 [ 2762.008995][T32029] active_anon 252334080 [ 2762.008995][T32029] inactive_file 65536 [ 2762.008995][T32029] active_file 28672 [ 2762.008995][T32029] unevictable 0 [ 2762.008995][T32029] slab_reclaimable 2973696 [ 2762.008995][T32029] slab_unreclaimable 15155200 [ 2762.008995][T32029] pgfault 194799 [ 2762.008995][T32029] pgmajfault 0 [ 2762.008995][T32029] workingset_refault 33 [ 2762.008995][T32029] workingset_activate 0 [ 2762.008995][T32029] workingset_nodereclaim 0 [ 2762.008995][T32029] pgrefill 25403 [ 2762.008995][T32029] pgscan 25073 [ 2762.008995][T32029] pgsteal 225 23:19:01 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500eeffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2762.228849][T32026] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2762.242806][T32029] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12508,uid=0 [ 2762.302954][T32026] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:01 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fb1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2762.362843][T32026] loop5: p2 < > [ 2762.392983][T32050] ldm_validate_privheads(): Disk read failed. [ 2762.401691][T32050] Dev loop4: unable to read RDB block 1 [ 2762.412235][T32029] Memory cgroup out of memory: Killed process 12508 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 23:19:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x2f000000}, 0x0) [ 2762.464538][T32050] loop4: unable to read partition table [ 2762.488822][ T1136] oom_reaper: reaped process 12508 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 2762.509811][T32050] loop4: partition table beyond EOD, truncated 23:19:02 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000021000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2762.540590][T32050] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:19:02 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f00000001c0)=0x3) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) getcwd(&(0x7f00000000c0)=""/225, 0xe1) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:02 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0014000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:02 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500f5ffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:02 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fc1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2762.905500][T32066] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:02 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c000200050048d47ac5ebab6ccf12954e010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000020000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df90de3e41b317636dc46e47f0a3f1cd4ce77c76e726b00000000000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae800e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2762.979821][T32066] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2762.991946][T32082] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2763.033200][T32082] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2763.038522][T32066] loop5: p2 < > [ 2763.068206][T32079] ldm_validate_privheads(): Disk read failed. [ 2763.092022][T32082] loop3: p2 < > [ 2763.109020][T32079] Dev loop4: unable to read RDB block 1 [ 2763.114880][T32079] loop4: unable to read partition table [ 2763.123112][T32079] loop4: partition table beyond EOD, truncated [ 2763.129523][T32079] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:19:02 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000022000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2763.338582][T32099] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 2763.370121][T32099] CPU: 0 PID: 32099 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2763.379791][T32099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.389844][T32099] Call Trace: [ 2763.393150][T32099] dump_stack+0x197/0x210 [ 2763.397502][T32099] dump_header+0x177/0x1152 [ 2763.402017][T32099] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2763.407830][T32099] ? ___ratelimit+0x2c8/0x595 [ 2763.412515][T32099] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2763.418328][T32099] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2763.423713][T32099] ? trace_hardirqs_on+0x67/0x240 [ 2763.428749][T32099] ? pagefault_out_of_memory+0x11c/0x11c [ 2763.434387][T32099] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2763.440199][T32099] ? ___ratelimit+0x60/0x595 [ 2763.444795][T32099] ? do_raw_spin_unlock+0x181/0x270 [ 2763.450008][T32099] oom_kill_process.cold+0x10/0x15 [ 2763.455134][T32099] out_of_memory+0x334/0x13c0 [ 2763.459810][T32099] ? find_held_lock+0x35/0x130 [ 2763.464605][T32099] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2763.470428][T32099] ? oom_killer_disable+0x280/0x280 [ 2763.475660][T32099] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2763.481212][T32099] ? memcg_oom_wake_function+0x700/0x700 [ 2763.486863][T32099] ? do_raw_spin_unlock+0x181/0x270 [ 2763.492072][T32099] ? _raw_spin_unlock+0x28/0x40 [ 2763.496932][T32099] try_charge+0xeb1/0x13e0 [ 2763.501374][T32099] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2763.507046][T32099] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2763.512607][T32099] ? mem_cgroup_css_offline+0x330/0x330 [ 2763.518155][T32099] ? __kasan_check_read+0x11/0x20 [ 2763.523192][T32099] mem_cgroup_try_charge+0x136/0x590 [ 2763.528490][T32099] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2763.534139][T32099] wp_page_copy+0x421/0x1610 [ 2763.538734][T32099] ? find_held_lock+0x35/0x130 [ 2763.543514][T32099] ? follow_pfn+0x2a0/0x2a0 [ 2763.548027][T32099] ? lock_downgrade+0x920/0x920 [ 2763.552889][T32099] ? swp_swapcount+0x540/0x540 [ 2763.557657][T32099] ? do_raw_spin_unlock+0x181/0x270 [ 2763.562864][T32099] do_wp_page+0x499/0x1440 [ 2763.567291][T32099] ? finish_mkwrite_fault+0x5c0/0x5c0 [ 2763.572681][T32099] __handle_mm_fault+0x1be9/0x3c20 [ 2763.577807][T32099] ? apply_to_existing_page_range+0x50/0x50 [ 2763.583713][T32099] ? handle_mm_fault+0x292/0xa50 [ 2763.588680][T32099] ? handle_mm_fault+0x7a0/0xa50 [ 2763.593629][T32099] ? __kasan_check_read+0x11/0x20 [ 2763.598774][T32099] handle_mm_fault+0x3b2/0xa50 [ 2763.603559][T32099] do_page_fault+0x545/0x12e1 [ 2763.608263][T32099] page_fault+0x39/0x40 [ 2763.612431][T32099] RIP: 0033:0x4113a8 [ 2763.616327][T32099] Code: 48 8b 05 13 cb 30 00 48 89 08 48 8b 15 11 cb 30 00 48 89 42 08 48 8b 05 f6 ca 30 00 48 89 05 ff ca 30 00 49 8d 81 c0 02 00 00 <48> 89 05 e1 12 66 00 49 8b 89 c8 02 00 00 49 8b 91 c0 02 00 00 48 [ 2763.635937][T32099] RSP: 002b:00007ffef1e63258 EFLAGS: 00010246 [ 2763.642005][T32099] RAX: 0000000002161c00 RBX: 00007ffef1e63260 RCX: 000000000071dea0 [ 2763.649988][T32099] RDX: 00000000004111e0 RSI: 000000000071de90 RDI: 0000000002161c20 [ 2763.657963][T32099] RBP: 00007ffef1e632a0 R08: 0000000000000001 R09: 0000000002161940 [ 2763.665932][T32099] R10: 0000000002161c10 R11: 0000000000000202 R12: 0000000000000001 [ 2763.673898][T32099] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffef1e632f0 [ 2763.693325][T32099] memory: usage 307184kB, limit 307200kB, failcnt 7710 [ 2763.700236][T32099] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2763.707361][T32099] Memory cgroup stats for /syz2: [ 2763.707447][T32099] anon 252456960 [ 2763.707447][T32099] file 77824 [ 2763.707447][T32099] kernel_stack 8589312 [ 2763.707447][T32099] slab 18128896 [ 2763.707447][T32099] sock 147456 [ 2763.707447][T32099] shmem 0 [ 2763.707447][T32099] file_mapped 0 [ 2763.707447][T32099] file_dirty 0 [ 2763.707447][T32099] file_writeback 0 [ 2763.707447][T32099] anon_thp 218103808 [ 2763.707447][T32099] inactive_anon 135168 [ 2763.707447][T32099] active_anon 252370944 [ 2763.707447][T32099] inactive_file 65536 [ 2763.707447][T32099] active_file 28672 [ 2763.707447][T32099] unevictable 0 [ 2763.707447][T32099] slab_reclaimable 2973696 [ 2763.707447][T32099] slab_unreclaimable 15155200 [ 2763.707447][T32099] pgfault 194931 [ 2763.707447][T32099] pgmajfault 0 [ 2763.707447][T32099] workingset_refault 33 [ 2763.707447][T32099] workingset_activate 0 [ 2763.707447][T32099] workingset_nodereclaim 0 23:19:03 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500f6ffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:03 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fd1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:03 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0014000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2763.707447][T32099] pgrefill 25436 [ 2763.707447][T32099] pgscan 25073 [ 2763.707447][T32099] pgsteal 225 [ 2763.803693][T32099] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=32080,uid=0 [ 2763.820483][T32099] Memory cgroup out of memory: Killed process 32080 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2763.838415][T32110] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2763.870999][ T1136] oom_reaper: reaped process 32080 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 2763.917781][T32110] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2764.030709][T32110] loop5: p2 < > 23:19:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2764.130586][T32123] ldm_validate_privheads(): Disk read failed. [ 2764.157977][T32123] Dev loop4: unable to read RDB block 1 [ 2764.173089][T32099] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2764.245622][T32099] CPU: 1 PID: 32099 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2764.250602][T32123] loop4: unable to read partition table [ 2764.255267][T32099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2764.255273][T32099] Call Trace: [ 2764.255296][T32099] dump_stack+0x197/0x210 [ 2764.255329][T32099] dump_header+0x177/0x1152 [ 2764.283053][T32099] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2764.288858][T32099] ? ___ratelimit+0x2c8/0x595 [ 2764.291633][T32123] loop4: partition table beyond EOD, truncated [ 2764.293531][T32099] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2764.293549][T32099] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2764.293572][T32099] ? trace_hardirqs_on+0x67/0x240 [ 2764.293595][T32099] ? pagefault_out_of_memory+0x11c/0x11c [ 2764.299795][T32123] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 2764.305516][T32099] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2764.305533][T32099] ? ___ratelimit+0x60/0x595 [ 2764.305548][T32099] ? do_raw_spin_unlock+0x181/0x270 [ 2764.305576][T32099] oom_kill_process.cold+0x10/0x15 [ 2764.305599][T32099] out_of_memory+0x334/0x13c0 [ 2764.305612][T32099] ? find_held_lock+0x35/0x130 [ 2764.305635][T32099] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2764.305656][T32099] ? oom_killer_disable+0x280/0x280 [ 2764.305687][T32099] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2764.376069][T32099] ? memcg_oom_wake_function+0x700/0x700 [ 2764.381717][T32099] ? do_raw_spin_unlock+0x181/0x270 [ 2764.386920][T32099] ? _raw_spin_unlock+0x28/0x40 [ 2764.391783][T32099] try_charge+0xeb1/0x13e0 [ 2764.396229][T32099] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2764.401781][T32099] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2764.407330][T32099] ? mem_cgroup_css_offline+0x330/0x330 [ 2764.412875][T32099] ? __kasan_check_read+0x11/0x20 [ 2764.417930][T32099] mem_cgroup_try_charge+0x136/0x590 [ 2764.423233][T32099] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2764.428885][T32099] __handle_mm_fault+0x1f4a/0x3c20 [ 2764.434129][T32099] ? apply_to_existing_page_range+0x50/0x50 [ 2764.440034][T32099] ? handle_mm_fault+0x292/0xa50 [ 2764.444997][T32099] ? handle_mm_fault+0x7a0/0xa50 [ 2764.449945][T32099] ? __kasan_check_read+0x11/0x20 [ 2764.454978][T32099] handle_mm_fault+0x3b2/0xa50 [ 2764.459759][T32099] do_page_fault+0x545/0x12e1 [ 2764.464463][T32099] page_fault+0x39/0x40 [ 2764.468614][T32099] RIP: 0033:0x45dd4d [ 2764.472506][T32099] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 e0 8c fb ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 2764.492109][T32099] RSP: 002b:00007ffef1e62fc8 EFLAGS: 00010202 [ 2764.498171][T32099] RAX: ffffffffffffffea RBX: 00007fda7d231700 RCX: 00007fda7d231700 [ 2764.506139][T32099] RDX: 00000000003d0f00 RSI: 00007fda7d230db0 RDI: 0000000000411f80 [ 2764.514110][T32099] RBP: 00007ffef1e631e0 R08: 00007fda7d2319d0 R09: 00007fda7d231700 [ 2764.522087][T32099] R10: 00007fda7d230dc0 R11: 0000000000000246 R12: 0000000000000000 [ 2764.530056][T32099] R13: 00007ffef1e6307f R14: 00007fda7d2319c0 R15: 000000000075bfd4 [ 2764.593465][T32099] memory: usage 307168kB, limit 307200kB, failcnt 7728 23:19:04 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500fdffffff4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2764.651609][T32136] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:04 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fe1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:04 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000023000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2764.696687][T32136] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2764.707966][T32136] loop3: p2 < > [ 2764.730760][T32099] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2764.761063][T32099] Memory cgroup stats for /syz2: [ 2764.761202][T32099] anon 252243968 [ 2764.761202][T32099] file 77824 [ 2764.761202][T32099] kernel_stack 8626176 [ 2764.761202][T32099] slab 18128896 [ 2764.761202][T32099] sock 147456 [ 2764.761202][T32099] shmem 0 [ 2764.761202][T32099] file_mapped 0 [ 2764.761202][T32099] file_dirty 0 [ 2764.761202][T32099] file_writeback 0 [ 2764.761202][T32099] anon_thp 218103808 [ 2764.761202][T32099] inactive_anon 135168 [ 2764.761202][T32099] active_anon 252243968 [ 2764.761202][T32099] inactive_file 65536 [ 2764.761202][T32099] active_file 28672 [ 2764.761202][T32099] unevictable 0 [ 2764.761202][T32099] slab_reclaimable 2973696 [ 2764.761202][T32099] slab_unreclaimable 15155200 [ 2764.761202][T32099] pgfault 194997 [ 2764.761202][T32099] pgmajfault 0 [ 2764.761202][T32099] workingset_refault 33 [ 2764.761202][T32099] workingset_activate 0 [ 2764.761202][T32099] workingset_nodereclaim 0 [ 2764.761202][T32099] pgrefill 25436 [ 2764.761202][T32099] pgscan 25106 [ 2764.761202][T32099] pgsteal 225 [ 2764.894977][T32099] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12485,uid=0 [ 2764.996254][T32150] ldm_validate_privheads(): Disk read failed. [ 2765.016577][T32099] Memory cgroup out of memory: Killed process 12485 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2765.052912][T32150] Dev loop4: unable to read RDB block 1 [ 2765.093018][T32150] loop4: unable to read partition table 23:19:04 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0014000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2765.104798][T32152] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2765.118714][T32150] loop4: partition table beyond EOD, truncated [ 2765.139685][T32150] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:19:04 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ff1e0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2765.178202][T32152] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2765.204317][T32152] loop5: p2 < > 23:19:04 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000002500000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:04 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x39, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[]}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2765.446605][T32173] loop4: p2 < > [ 2765.455077][T32173] loop4: partition table partially beyond EOD, truncated [ 2765.476351][T32173] loop4: p2 size 2 extends beyond EOD, truncated 23:19:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:05 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000200004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:05 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000024000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:05 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00001f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2765.927359][T32172] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2765.945726][T32172] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2765.971894][T32172] loop3: p2 < > [ 2766.021249][T32198] ldm_validate_privheads(): Disk read failed. [ 2766.032848][T32198] loop4: p2 < > [ 2766.065956][T32198] loop4: partition table partially beyond EOD, truncated [ 2766.106331][T32206] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2766.140855][T32198] loop4: p2 size 2 extends beyond EOD, truncated [ 2766.206248][T32206] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2766.282850][T32206] loop5: p2 < > 23:19:05 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000300004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:05 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x11000000}, 0x0) 23:19:05 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00011f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:05 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) sendto$isdn(r0, &(0x7f00000000c0)={0x6, 0x8, "e6306fc7ca172461fb4658667ab17a5ec7297ccc660c3b3554f9fe2e571e8648c645c3809befddb908578a5b4d7160464429707b39d1b3eb56f56bef55cdcaff5b39838f4aab4039fd94bfd969ea98da71018879ee1d88faaee793c47825d2a8bf91e87a52112e8953af5cce0fe0cb360f9a1449d6baeefa48777a20bbcb7c6e204f303fe7ef94df41a680cf86973a73eb9e83046a8a41b9f526e2c48b11987de09948136549f86db2c85a4e119883bedfe5b37e57ac344c716980d22f6f68b5975af4f1def50a52c45017c58cdc45457776f415fc9524180ec0307144c7c12f38ffe6295a0f1338b2656a837aaee492cd19b5e6bbf4d99e5bb2"}, 0x102, 0x40, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r6, 0x4, 0xffffffffffffffff, 0x8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r7 = getpgrp(r6) wait4(r7, 0x0, 0x2, 0x0) r8 = getpid() tkill(r8, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:05 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000025000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:06 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x7a75c0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r4, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r4, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x3f, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r5, 0x2, r3, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r6, 0x81785501, &(0x7f0000000100)=""/40) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2766.621467][T32224] ldm_validate_privheads(): Disk read failed. [ 2766.646567][T32224] loop4: p2 < > 23:19:06 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x11000000}, 0x0) [ 2766.673447][T32224] loop4: partition table partially beyond EOD, truncated [ 2766.691525][T32224] loop4: p2 size 2 extends beyond EOD, truncated 23:19:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:06 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00021f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:06 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000400004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2766.890676][T32238] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2766.974696][T32238] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2767.027401][T32238] loop5: p2 < > 23:19:06 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x11000000}, 0x0) 23:19:06 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00031f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:06 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000026000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2767.285514][T32262] ldm_validate_privheads(): Disk read failed. [ 2767.312885][T32235] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 2767.344028][T32262] loop4: p2 < > [ 2767.363492][T32235] CPU: 0 PID: 32235 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2767.373049][T32235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2767.383107][T32235] Call Trace: [ 2767.386413][T32235] dump_stack+0x197/0x210 [ 2767.390758][T32235] dump_header+0x177/0x1152 [ 2767.395273][T32235] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2767.401088][T32235] ? ___ratelimit+0x2c8/0x595 [ 2767.405768][T32235] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2767.411571][T32235] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2767.416870][T32235] ? trace_hardirqs_on+0x67/0x240 [ 2767.421929][T32235] ? pagefault_out_of_memory+0x11c/0x11c [ 2767.427568][T32235] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2767.433381][T32235] ? ___ratelimit+0x60/0x595 [ 2767.437975][T32235] ? do_raw_spin_unlock+0x181/0x270 [ 2767.443177][T32235] oom_kill_process.cold+0x10/0x15 [ 2767.448294][T32235] out_of_memory+0x334/0x13c0 [ 2767.452972][T32235] ? find_held_lock+0x35/0x130 [ 2767.457739][T32235] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2767.463556][T32235] ? oom_killer_disable+0x280/0x280 [ 2767.468774][T32235] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2767.474323][T32235] ? memcg_oom_wake_function+0x700/0x700 [ 2767.479984][T32235] ? do_raw_spin_unlock+0x181/0x270 [ 2767.485179][T32235] ? _raw_spin_unlock+0x28/0x40 [ 2767.490039][T32235] try_charge+0xeb1/0x13e0 [ 2767.494451][T32235] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2767.500007][T32235] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2767.505561][T32235] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2767.511118][T32235] ? lock_downgrade+0x920/0x920 [ 2767.515977][T32235] ? __kasan_check_read+0x11/0x20 [ 2767.521012][T32235] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2767.526564][T32235] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2767.531956][T32235] ? __isolate_free_page+0x4c0/0x4c0 [ 2767.537255][T32235] __memcg_kmem_charge+0x13a/0x3a0 [ 2767.542380][T32235] __alloc_pages_nodemask+0x4f5/0x910 [ 2767.547763][T32235] ? free_transhuge_page+0x2a7/0x3b0 [ 2767.553048][T32235] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2767.559290][T32235] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2767.565002][T32235] ? __put_compound_page+0x90/0xd0 [ 2767.570110][T32235] ? put_page+0x1c8/0x230 [ 2767.574445][T32235] ? do_huge_pmd_anonymous_page+0xceb/0x1a50 [ 2767.580430][T32235] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2767.586684][T32235] alloc_pages_current+0x107/0x210 [ 2767.591802][T32235] pte_alloc_one+0x1b/0x1a0 [ 2767.596339][T32235] __pte_alloc+0x20/0x310 [ 2767.600666][T32235] __handle_mm_fault+0x269d/0x3c20 [ 2767.605787][T32235] ? apply_to_existing_page_range+0x50/0x50 [ 2767.611678][T32235] ? handle_mm_fault+0x292/0xa50 [ 2767.616638][T32235] ? handle_mm_fault+0x7a0/0xa50 [ 2767.621601][T32235] ? __kasan_check_read+0x11/0x20 [ 2767.626652][T32235] handle_mm_fault+0x3b2/0xa50 [ 2767.631433][T32235] do_page_fault+0x545/0x12e1 [ 2767.636132][T32235] page_fault+0x39/0x40 [ 2767.640293][T32235] RIP: 0033:0x4005c0 [ 2767.644196][T32235] Code: 01 e9 cd 01 00 00 48 8b 44 24 10 48 0b 44 24 28 75 20 48 8b 14 24 48 8b 7c 24 20 be 02 00 00 00 e8 55 56 00 00 48 8b 4c 24 08 <66> 89 01 e9 a1 01 00 00 48 8b 44 24 08 48 8b 14 24 be 02 00 00 00 [ 2767.663799][T32235] RSP: 002b:00007ffef1e630c0 EFLAGS: 00010206 [ 2767.669863][T32235] RAX: 0000000000000002 RBX: 000000000075c9a0 RCX: 0000000020e68000 [ 2767.677855][T32235] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 2767.685820][T32235] RBP: 0000000000760830 R08: 0000000000000000 R09: 0000000000000000 [ 2767.693789][T32235] R10: 00007ffef1e631d0 R11: 0000000000000246 R12: 000000000075bf20 [ 2767.701753][T32235] R13: 00000000002a394b R14: 0000000000760838 R15: 000000000075bf2c [ 2767.711315][T32262] loop4: partition table partially beyond EOD, truncated [ 2767.765106][T32273] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2767.769126][T32235] memory: usage 307168kB, limit 307200kB, failcnt 7768 [ 2767.788792][T32235] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2767.796194][T32235] Memory cgroup stats for /syz2: [ 2767.796314][T32235] anon 252395520 [ 2767.796314][T32235] file 77824 [ 2767.796314][T32235] kernel_stack 8589312 [ 2767.796314][T32235] slab 18128896 [ 2767.796314][T32235] sock 147456 [ 2767.796314][T32235] shmem 0 [ 2767.796314][T32235] file_mapped 0 [ 2767.796314][T32235] file_dirty 0 [ 2767.796314][T32235] file_writeback 0 [ 2767.796314][T32235] anon_thp 218103808 [ 2767.796314][T32235] inactive_anon 135168 [ 2767.796314][T32235] active_anon 252395520 [ 2767.796314][T32235] inactive_file 65536 [ 2767.796314][T32235] active_file 28672 [ 2767.796314][T32235] unevictable 0 [ 2767.796314][T32235] slab_reclaimable 2973696 [ 2767.796314][T32235] slab_unreclaimable 15155200 [ 2767.796314][T32235] pgfault 195195 [ 2767.796314][T32235] pgmajfault 0 [ 2767.796314][T32235] workingset_refault 33 [ 2767.796314][T32235] workingset_activate 0 [ 2767.796314][T32235] workingset_nodereclaim 0 [ 2767.796314][T32235] pgrefill 25469 [ 2767.796314][T32235] pgscan 25139 [ 2767.796314][T32235] pgsteal 225 [ 2767.832444][T32273] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2767.892063][T32235] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12460,uid=0 [ 2767.913892][T32235] Memory cgroup out of memory: Killed process 12460 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2767.935623][T32262] loop4: p2 size 2 extends beyond EOD, truncated 23:19:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2767.994012][T32273] loop5: p2 < > 23:19:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000500004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:07 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00041f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:07 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:07 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000027000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2768.475224][T32300] ldm_validate_privheads(): Disk read failed. 23:19:07 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xf000000}, 0x0) [ 2768.525935][T32300] loop4: p2 < > 23:19:08 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x6000000}, 0x0) [ 2768.608579][T32300] loop4: partition table partially beyond EOD, truncated 23:19:08 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = dup2(r1, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x6c, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000000c0)={r9, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x8, 0x5}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r10, 0x3f, 0x6ff}, 0x8) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r11 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r11, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r11, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r12 = getpid() tkill(r12, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r13, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:08 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x3000000}, 0x0) [ 2768.730330][T32300] loop4: p2 size 2 extends beyond EOD, truncated 23:19:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:08 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00051f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:08 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x2000000}, 0x0) 23:19:08 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000600004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2769.077819][T32310] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2769.092289][T32327] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=1000 [ 2769.123962][T32310] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2769.135920][T32310] loop5: p2 < > [ 2769.176139][T32327] CPU: 0 PID: 32327 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2769.185688][T32327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2769.195741][T32327] Call Trace: [ 2769.199040][T32327] dump_stack+0x197/0x210 [ 2769.203391][T32327] dump_header+0x177/0x1152 [ 2769.207905][T32327] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2769.213715][T32327] ? ___ratelimit+0x2c8/0x595 [ 2769.218399][T32327] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2769.224308][T32327] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2769.229619][T32327] ? trace_hardirqs_on+0x67/0x240 [ 2769.234659][T32327] ? pagefault_out_of_memory+0x11c/0x11c [ 2769.240315][T32327] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2769.246207][T32327] ? ___ratelimit+0x60/0x595 [ 2769.250841][T32327] ? do_raw_spin_unlock+0x181/0x270 [ 2769.256080][T32327] oom_kill_process.cold+0x10/0x15 [ 2769.261209][T32327] out_of_memory+0x334/0x13c0 [ 2769.265887][T32327] ? find_held_lock+0x35/0x130 [ 2769.270660][T32327] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2769.276479][T32327] ? oom_killer_disable+0x280/0x280 [ 2769.281698][T32327] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2769.287250][T32327] ? memcg_oom_wake_function+0x700/0x700 [ 2769.292894][T32327] ? do_raw_spin_unlock+0x181/0x270 [ 2769.298099][T32327] ? _raw_spin_unlock+0x28/0x40 [ 2769.302972][T32327] try_charge+0xeb1/0x13e0 [ 2769.307395][T32327] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2769.312951][T32327] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2769.318506][T32327] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2769.324059][T32327] ? lock_downgrade+0x920/0x920 [ 2769.328923][T32327] ? __kasan_check_read+0x11/0x20 [ 2769.333959][T32327] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2769.339507][T32327] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2769.344885][T32327] ? __isolate_free_page+0x4c0/0x4c0 [ 2769.350175][T32327] __memcg_kmem_charge+0x13a/0x3a0 [ 2769.355291][T32327] __alloc_pages_nodemask+0x4f5/0x910 [ 2769.360667][T32327] ? free_transhuge_page+0x2a7/0x3b0 [ 2769.365954][T32327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2769.372201][T32327] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2769.377921][T32327] ? __put_compound_page+0x90/0xd0 [ 2769.383042][T32327] ? put_page+0x1c8/0x230 [ 2769.387497][T32327] ? do_huge_pmd_anonymous_page+0xceb/0x1a50 [ 2769.393479][T32327] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2769.399735][T32327] alloc_pages_current+0x107/0x210 [ 2769.404916][T32327] pte_alloc_one+0x1b/0x1a0 [ 2769.409443][T32327] __pte_alloc+0x20/0x310 [ 2769.413785][T32327] __handle_mm_fault+0x269d/0x3c20 [ 2769.418921][T32327] ? apply_to_existing_page_range+0x50/0x50 [ 2769.424824][T32327] ? handle_mm_fault+0x292/0xa50 [ 2769.429776][T32327] ? handle_mm_fault+0x7a0/0xa50 [ 2769.434898][T32327] ? __kasan_check_read+0x11/0x20 [ 2769.439935][T32327] handle_mm_fault+0x3b2/0xa50 [ 2769.444723][T32327] do_page_fault+0x545/0x12e1 [ 2769.449421][T32327] page_fault+0x39/0x40 [ 2769.453578][T32327] RIP: 0033:0x4005c0 [ 2769.457478][T32327] Code: 01 e9 cd 01 00 00 48 8b 44 24 10 48 0b 44 24 28 75 20 48 8b 14 24 48 8b 7c 24 20 be 02 00 00 00 e8 55 56 00 00 48 8b 4c 24 08 <66> 89 01 e9 a1 01 00 00 48 8b 44 24 08 48 8b 14 24 be 02 00 00 00 23:19:08 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x1000000}, 0x0) 23:19:08 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00061f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2769.477481][T32327] RSP: 002b:00007ffef1e630c0 EFLAGS: 00010206 [ 2769.483546][T32327] RAX: 0000000000000002 RBX: 000000000075c9a0 RCX: 00000000206f7000 [ 2769.491515][T32327] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000002 [ 2769.499484][T32327] RBP: 0000000000760678 R08: 0000000000000000 R09: 0000000000000000 [ 2769.507458][T32327] R10: 00007ffef1e631d0 R11: 0000000000000246 R12: 000000000075bf20 [ 2769.515429][T32327] R13: 00000000002a403c R14: 0000000000760680 R15: 000000000075bf2c [ 2769.541736][T32327] memory: usage 307200kB, limit 307200kB, failcnt 7779 23:19:09 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000028000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2769.578903][T32327] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2769.603325][T32347] ldm_validate_privheads(): Disk read failed. [ 2769.610946][T32347] loop4: p2 < > [ 2769.614571][T32327] Memory cgroup stats for /syz2: [ 2769.614696][T32327] anon 252456960 [ 2769.614696][T32327] file 77824 [ 2769.614696][T32327] kernel_stack 8589312 [ 2769.614696][T32327] slab 18128896 [ 2769.614696][T32327] sock 147456 [ 2769.614696][T32327] shmem 0 [ 2769.614696][T32327] file_mapped 0 [ 2769.614696][T32327] file_dirty 0 [ 2769.614696][T32327] file_writeback 0 [ 2769.614696][T32327] anon_thp 218103808 [ 2769.614696][T32327] inactive_anon 135168 [ 2769.614696][T32327] active_anon 252456960 [ 2769.614696][T32327] inactive_file 65536 [ 2769.614696][T32327] active_file 28672 [ 2769.614696][T32327] unevictable 0 [ 2769.614696][T32327] slab_reclaimable 2973696 [ 2769.614696][T32327] slab_unreclaimable 15155200 [ 2769.614696][T32327] pgfault 195360 [ 2769.614696][T32327] pgmajfault 0 [ 2769.614696][T32327] workingset_refault 33 [ 2769.614696][T32327] workingset_activate 0 [ 2769.614696][T32327] workingset_nodereclaim 0 [ 2769.614696][T32327] pgrefill 25535 [ 2769.614696][T32327] pgscan 25205 [ 2769.614696][T32327] pgsteal 225 [ 2769.712280][T32347] loop4: partition table partially beyond EOD, truncated 23:19:09 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00071f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2769.768338][T32347] loop4: p2 size 2 extends beyond EOD, truncated 23:19:09 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xf000}, 0x0) [ 2769.859140][T32327] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12438,uid=0 23:19:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x11, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2769.906368][T32327] Memory cgroup out of memory: Killed process 12438 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2769.925759][ T1136] oom_reaper: reaped process 12438 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 23:19:09 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff, 0x0, @perf_bp={0x0}, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r2, 0x4, 0xffffffffffffffff, 0x8) sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x60) tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8, 0x0, 0x0, 0x4}, 0x80) [ 2770.146364][T32363] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:09 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000700004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2770.209093][T32363] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2770.222733][T32363] loop5: p2 < > 23:19:09 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00081f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:09 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0xf000}, 0x0) 23:19:09 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0xffffffaa, &(0x7f0000000200)={0x0, 0xff45}, 0x8, 0x0, 0x0, 0x4000}, 0x20048814) 23:19:09 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000003f000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2770.530742][T32382] ldm_validate_privheads(): Disk read failed. [ 2770.564712][T32382] loop4: p2 < > [ 2770.590704][T32382] loop4: partition table partially beyond EOD, truncated 23:19:10 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x3a00}, 0x0) [ 2770.638091][T32382] loop4: p2 size 2 extends beyond EOD, truncated 23:19:10 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00091f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:10 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000800004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x29, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:10 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000a1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:10 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x3a00}, 0x0) [ 2771.182921][T32424] ldm_validate_privheads(): Disk read failed. [ 2771.194339][T32406] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2771.242054][T32424] loop4: p2 < > [ 2771.264276][T32406] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2771.273664][T32424] loop4: partition table partially beyond EOD, truncated 23:19:10 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$x25(r3, &(0x7f00000000c0)=""/40, 0x28, 0x40032100, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000000)={0x81, 0x1, 0x4, 0xc00000, 0x1f, "4f4347719f9df6a49bf0403c4c61cc18254bff", 0x8, 0x3}) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2771.336561][T32406] loop5: p2 < > [ 2771.349741][T32424] loop4: p2 size 2 extends beyond EOD, truncated 23:19:11 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e0014000000000000fe030f0000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:11 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000900004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:11 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000040000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:11 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000b1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2771.946974][T32451] ldm_validate_privheads(): Disk read failed. [ 2771.960779][T32451] loop4: p2 < > [ 2771.964353][T32451] loop4: partition table partially beyond EOD, truncated [ 2771.980669][T32451] loop4: p2 size 2 extends beyond EOD, truncated 23:19:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2b, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2772.053554][T32458] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2772.122980][T32458] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2772.133675][T32458] loop3: p2 < > 23:19:11 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000a00004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2772.205553][T32467] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2772.278326][T32467] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2772.328561][T32467] loop5: p2 < > 23:19:11 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000c1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:11 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x2615}, 0x0) 23:19:11 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000000)) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r3, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2772.431232][T32479] ldm_validate_privheads(): Disk read failed. [ 2772.437660][T32479] loop4: p2 < > [ 2772.457454][T32479] loop4: partition table partially beyond EOD, truncated [ 2772.536129][T32479] loop4: p2 size 2 extends beyond EOD, truncated 23:19:12 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000be5a941000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:12 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000c00004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:12 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x4) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r6, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r6, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r7 = pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$netrom(r5, &(0x7f00000002c0)={{0x3, @default, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) [ 2773.031367][T32504] ldm_validate_privheads(): Disk read failed. [ 2773.037891][T32504] loop4: p2 < > [ 2773.063095][T32504] loop4: partition table partially beyond EOD, truncated 23:19:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2c, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2773.149453][T32504] loop4: p2 size 2 extends beyond EOD, truncated 23:19:12 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000d1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2773.309200][T32502] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2773.321916][T32513] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2773.345566][T32513] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 23:19:12 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$x25(r3, &(0x7f00000000c0)=""/40, 0x28, 0x40032100, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000000)={0x81, 0x1, 0x4, 0xc00000, 0x1f, "4f4347719f9df6a49bf0403c4c61cc18254bff", 0x8, 0x3}) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2773.421052][T32502] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2773.437242][T32502] loop5: p2 < > 23:19:12 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500002300004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:13 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000e1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2773.681125][T32530] ldm_validate_privheads(): Disk read failed. [ 2773.687782][T32530] loop4: p2 < > [ 2773.730192][T32530] loop4: partition table partially beyond EOD, truncated [ 2773.760796][T32530] loop4: p2 size 2 extends beyond EOD, truncated 23:19:13 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000048000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:13 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500004800004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2f, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:13 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2774.252390][T32559] ldm_validate_privheads(): Disk read failed. [ 2774.258923][T32559] loop4: p2 < > [ 2774.305300][T32559] loop4: partition table partially beyond EOD, truncated [ 2774.314425][T32556] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:13 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000f1f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2774.358541][T32559] loop4: p2 size 2 extends beyond EOD, truncated [ 2774.365504][T32556] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2774.397082][T32556] loop5: p2 < > 23:19:13 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0xfffe, 0x3, 0x7f, 0xce, 0x2, @broadcast}, 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:13 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x4) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r6, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r6, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r7 = pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$netrom(r5, &(0x7f00000002c0)={{0x3, @default, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 23:19:14 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500004c00004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3a, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:14 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00101f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2774.791118][T32585] ldm_validate_privheads(): Disk read failed. [ 2774.803212][T32585] loop4: p2 < > 23:19:14 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x4) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r6, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r6, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) r7 = pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$netrom(r5, &(0x7f00000002c0)={{0x3, @default, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) [ 2774.836666][T32585] loop4: partition table partially beyond EOD, truncated 23:19:14 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000004c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2774.904374][T32585] loop4: p2 size 2 extends beyond EOD, truncated 23:19:14 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500006000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2775.043047][T32601] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2775.061784][T32580] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2775.109203][T32601] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2775.250087][T32580] CPU: 1 PID: 32580 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2775.259657][T32580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2775.269709][T32580] Call Trace: [ 2775.273015][T32580] dump_stack+0x197/0x210 [ 2775.277814][T32580] dump_header+0x177/0x1152 [ 2775.282328][T32580] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2775.288156][T32580] ? ___ratelimit+0x2c8/0x595 [ 2775.292839][T32580] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2775.298650][T32580] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2775.303942][T32580] ? trace_hardirqs_on+0x67/0x240 [ 2775.308986][T32580] ? pagefault_out_of_memory+0x11c/0x11c [ 2775.314628][T32580] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2775.320443][T32580] ? ___ratelimit+0x60/0x595 [ 2775.325047][T32580] ? do_raw_spin_unlock+0x181/0x270 [ 2775.330266][T32580] oom_kill_process.cold+0x10/0x15 [ 2775.335391][T32580] out_of_memory+0x334/0x13c0 [ 2775.340068][T32580] ? find_held_lock+0x35/0x130 [ 2775.344847][T32580] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2775.350667][T32580] ? oom_killer_disable+0x280/0x280 [ 2775.355901][T32580] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2775.361450][T32580] ? memcg_oom_wake_function+0x700/0x700 [ 2775.367113][T32580] ? do_raw_spin_unlock+0x181/0x270 [ 2775.372322][T32580] ? _raw_spin_unlock+0x28/0x40 [ 2775.377537][T32580] try_charge+0xeb1/0x13e0 [ 2775.381962][T32580] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2775.387520][T32580] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2775.393071][T32580] ? mem_cgroup_css_offline+0x330/0x330 [ 2775.398617][T32580] ? lock_downgrade+0x920/0x920 [ 2775.403487][T32580] mem_cgroup_try_charge+0x136/0x590 [ 2775.408790][T32580] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2775.414436][T32580] __handle_mm_fault+0x1f4a/0x3c20 [ 2775.419566][T32580] ? apply_to_existing_page_range+0x50/0x50 [ 2775.425464][T32580] ? handle_mm_fault+0x292/0xa50 [ 2775.430426][T32580] ? handle_mm_fault+0x7a0/0xa50 [ 2775.435387][T32580] ? __kasan_check_read+0x11/0x20 [ 2775.440423][T32580] handle_mm_fault+0x3b2/0xa50 [ 2775.445207][T32580] do_page_fault+0x545/0x12e1 [ 2775.449910][T32580] page_fault+0x39/0x40 [ 2775.454069][T32580] RIP: 0033:0x412b8f [ 2775.457967][T32580] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 2775.478127][T32580] RSP: 002b:00007ffef1e63010 EFLAGS: 00010206 [ 2775.484193][T32580] RAX: 00007fda7d211000 RBX: 0000000000020000 RCX: 000000000045b3ea [ 2775.492166][T32580] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 23:19:14 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00111f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2775.500134][T32580] RBP: 00007ffef1e630f0 R08: ffffffffffffffff R09: 0000000000000000 [ 2775.508099][T32580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef1e631e0 [ 2775.516066][T32580] R13: 00007fda7d231700 R14: 0000000000000001 R15: 000000000075bfd4 [ 2775.569898][T32615] ldm_validate_privheads(): Disk read failed. [ 2775.598560][T32615] loop4: p2 < > [ 2775.602742][T32615] loop4: partition table partially beyond EOD, truncated 23:19:15 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00101f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2775.623045][T32580] memory: usage 307200kB, limit 307200kB, failcnt 7836 [ 2775.623648][T32615] loop4: p2 size 2 extends beyond EOD, truncated [ 2775.652121][T32606] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2775.674560][T32580] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2775.690588][T32580] Memory cgroup stats for /syz2: [ 2775.690730][T32580] anon 252350464 [ 2775.690730][T32580] file 77824 [ 2775.690730][T32580] kernel_stack 8589312 [ 2775.690730][T32580] slab 18128896 [ 2775.690730][T32580] sock 147456 [ 2775.690730][T32580] shmem 0 [ 2775.690730][T32580] file_mapped 0 [ 2775.690730][T32580] file_dirty 0 [ 2775.690730][T32580] file_writeback 0 [ 2775.690730][T32580] anon_thp 218103808 [ 2775.690730][T32580] inactive_anon 135168 [ 2775.690730][T32580] active_anon 252395520 [ 2775.690730][T32580] inactive_file 65536 [ 2775.690730][T32580] active_file 28672 [ 2775.690730][T32580] unevictable 0 [ 2775.690730][T32580] slab_reclaimable 2973696 [ 2775.690730][T32580] slab_unreclaimable 15155200 [ 2775.690730][T32580] pgfault 195921 [ 2775.690730][T32580] pgmajfault 0 [ 2775.690730][T32580] workingset_refault 33 [ 2775.690730][T32580] workingset_activate 0 [ 2775.690730][T32580] workingset_nodereclaim 0 [ 2775.690730][T32580] pgrefill 25835 [ 2775.690730][T32580] pgscan 25469 [ 2775.690730][T32580] pgsteal 225 [ 2775.841250][T32606] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2775.879145][T32606] loop5: p2 < > [ 2775.890631][T32580] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=32575,uid=0 23:19:15 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00121f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:15 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500006800004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2775.976638][T32580] Memory cgroup out of memory: Killed process 32575 (syz-executor.2) total-vm:72988kB, anon-rss:2224kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 2775.996533][ T1136] oom_reaper: reaped process 32575 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 2776.077807][T32586] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2776.108477][T32586] CPU: 0 PID: 32586 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2776.118032][T32586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2776.128090][T32586] Call Trace: [ 2776.131390][T32586] dump_stack+0x197/0x210 [ 2776.135750][T32586] dump_header+0x177/0x1152 [ 2776.140260][T32586] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2776.146067][T32586] ? ___ratelimit+0x2c8/0x595 [ 2776.150757][T32586] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2776.156570][T32586] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2776.161870][T32586] ? trace_hardirqs_on+0x67/0x240 [ 2776.166906][T32586] ? pagefault_out_of_memory+0x11c/0x11c [ 2776.172548][T32586] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2776.178362][T32586] ? ___ratelimit+0x60/0x595 [ 2776.182962][T32586] ? do_raw_spin_unlock+0x181/0x270 [ 2776.188185][T32586] oom_kill_process.cold+0x10/0x15 [ 2776.193312][T32586] out_of_memory+0x334/0x13c0 [ 2776.198015][T32586] ? oom_killer_disable+0x280/0x280 [ 2776.203244][T32586] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2776.208799][T32586] ? memcg_oom_wake_function+0x700/0x700 [ 2776.214453][T32586] ? do_raw_spin_unlock+0x181/0x270 [ 2776.219668][T32586] ? _raw_spin_unlock+0x28/0x40 [ 2776.224530][T32586] try_charge+0x98f/0x13e0 [ 2776.228958][T32586] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2776.234513][T32586] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2776.240062][T32586] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2776.245613][T32586] ? lock_downgrade+0x920/0x920 [ 2776.250491][T32586] ? __kasan_check_read+0x11/0x20 [ 2776.255526][T32586] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2776.261074][T32586] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2776.266448][T32586] ? retint_kernel+0x2b/0x2b [ 2776.271047][T32586] __memcg_kmem_charge+0x13a/0x3a0 [ 2776.276165][T32586] copy_process+0x42bb/0x7290 [ 2776.280839][T32586] ? __kasan_check_read+0x11/0x20 [ 2776.285859][T32586] ? mark_lock+0xc2/0x1220 [ 2776.290304][T32586] ? __cleanup_sighand+0xc0/0xc0 [ 2776.295246][T32586] ? __might_fault+0x12b/0x1e0 [ 2776.300027][T32586] ? __might_fault+0x12b/0x1e0 [ 2776.304815][T32586] _do_fork+0x146/0x1090 [ 2776.309087][T32586] ? copy_init_mm+0x20/0x20 [ 2776.313609][T32586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2776.319075][T32586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2776.324531][T32586] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2776.329813][T32586] ? retint_kernel+0x2b/0x2b [ 2776.334404][T32586] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2776.340045][T32586] __x64_sys_clone+0x19a/0x260 [ 2776.344814][T32586] ? __ia32_sys_vfork+0xd0/0xd0 [ 2776.349666][T32586] ? __this_cpu_preempt_check+0x35/0x190 [ 2776.355306][T32586] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2776.360602][T32586] ? trace_hardirqs_on+0x67/0x240 [ 2776.365630][T32586] do_syscall_64+0xfa/0x790 [ 2776.370141][T32586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2776.376029][T32586] RIP: 0033:0x45b399 [ 2776.379927][T32586] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2776.399530][T32586] RSP: 002b:00007fda7d251c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2776.407956][T32586] RAX: ffffffffffffffda RBX: 00007fda7d2526d4 RCX: 000000000045b399 [ 2776.415927][T32586] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000004340100 [ 2776.423906][T32586] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 2776.431873][T32586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2776.439838][T32586] R13: 0000000000000070 R14: 00000000004c1c24 R15: 000000000075bf2c [ 2776.452227][T32586] memory: usage 304908kB, limit 307200kB, failcnt 7836 [ 2776.459159][T32586] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2776.466543][T32586] Memory cgroup stats for /syz2: [ 2776.467703][T32637] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2776.468144][T32586] anon 250204160 [ 2776.468144][T32586] file 77824 [ 2776.468144][T32586] kernel_stack 8589312 [ 2776.468144][T32586] slab 18128896 [ 2776.468144][T32586] sock 147456 [ 2776.468144][T32586] shmem 0 [ 2776.468144][T32586] file_mapped 0 [ 2776.468144][T32586] file_dirty 0 [ 2776.468144][T32586] file_writeback 0 [ 2776.468144][T32586] anon_thp 216006656 [ 2776.468144][T32586] inactive_anon 135168 [ 2776.468144][T32586] active_anon 250204160 [ 2776.468144][T32586] inactive_file 65536 [ 2776.468144][T32586] active_file 28672 [ 2776.468144][T32586] unevictable 0 [ 2776.468144][T32586] slab_reclaimable 2973696 [ 2776.468144][T32586] slab_unreclaimable 15155200 [ 2776.468144][T32586] pgfault 195921 [ 2776.468144][T32586] pgmajfault 0 [ 2776.468144][T32586] workingset_refault 33 [ 2776.468144][T32586] workingset_activate 0 [ 2776.468144][T32586] workingset_nodereclaim 0 [ 2776.468144][T32586] pgrefill 25835 [ 2776.468144][T32586] pgscan 25469 [ 2776.468144][T32586] pgsteal 225 [ 2776.473560][T32637] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2776.483017][T32586] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12416,uid=0 [ 2776.579593][T32637] loop3: p2 < > [ 2776.590718][T32586] Memory cgroup out of memory: Killed process 12416 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2776.700550][T32649] ldm_validate_privheads(): Disk read failed. [ 2776.723165][T32649] loop4: p2 < > [ 2776.727718][T32649] loop4: partition table partially beyond EOD, truncated [ 2776.753018][T32649] loop4: p2 size 2 extends beyond EOD, truncated 23:19:16 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x5b3201, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000100)="6a45083905283dcf83240f890eaff346f249b3003891f19de1cd3ee3bec74a469fd8750b6920fe303757ada2fd02b69a8d4aa8687da05e646837c6571f5cc3c98235dc9e503121d2f3e00f02e57c512c9da6688d6ffac30cd4b1aeb3deabef3d8047f87645ce17be0684562824d189792d1b38e1", 0x74) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_SET_FD(r2, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000002c0)=0xe1ed) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() r8 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r8, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='caif0\x00'}) tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) r10 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video0\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r10, 0x40286608, &(0x7f00000004c0)={0x6, 0x67, 0xb5, 0x7, 0xfffffe00, 0x3f}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r13, 0x5380) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3c, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:16 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000003255c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:16 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00131f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:16 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000004c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:16 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500006c00004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2777.424338][T32676] ldm_validate_privheads(): Disk read failed. [ 2777.486407][T32676] loop4: p2 < > [ 2777.525069][T32669] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2777.540759][T32669] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2777.550687][T32676] loop4: partition table partially beyond EOD, truncated [ 2777.571989][T32676] loop4: p2 size 2 extends beyond EOD, truncated [ 2777.585621][T32669] loop5: p2 < > [ 2777.631424][T32684] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2777.652178][T32684] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2777.659750][T32684] loop3: p2 < > 23:19:17 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500007400004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:17 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00141f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:17 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:17 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00111f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2778.012221][T32704] ldm_validate_privheads(): Disk read failed. [ 2778.018945][T32704] loop4: p2 < > [ 2778.033292][T32704] loop4: partition table partially beyond EOD, truncated [ 2778.055750][T32704] loop4: p2 size 2 extends beyond EOD, truncated 23:19:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x48, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:17 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000032563000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:17 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500007a00004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:17 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc4000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000100)={0x2, r7}) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) 23:19:17 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00151f0300000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2778.461607][T32722] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:17 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2778.527266][T32722] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2778.529010][T32733] ldm_validate_privheads(): Disk read failed. [ 2778.537152][T32722] loop3: p2 < > [ 2778.555920][T32733] loop4: p2 < > [ 2778.559661][T32733] loop4: partition table partially beyond EOD, truncated [ 2778.567492][T32733] loop4: p2 size 2 extends beyond EOD, truncated 23:19:18 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2778.678769][T32724] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2778.700562][T32724] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2778.712237][T32724] loop5: p2 < > 23:19:18 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500009000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:18 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:18 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000400000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:18 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:18 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000032564000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2779.130010][T32765] ldm_validate_privheads(): Disk read failed. [ 2779.143608][T32765] loop4: p2 < > [ 2779.151601][T32765] loop4: partition table partially beyond EOD, truncated [ 2779.166866][T32765] loop4: p2 size 2 extends beyond EOD, truncated 23:19:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x300, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:18 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001fff500010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df17636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a0000000000"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:18 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000003004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:18 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00f8070400000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:18 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2779.481393][ T319] ldm_validate_privheads(): Disk read failed. [ 2779.504068][ T319] loop4: p2 < > [ 2779.534139][ T319] loop4: partition table partially beyond EOD, truncated 23:19:19 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r3, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r3, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000000)={0x8, 'wireguard1\x00', {'bond_slave_1\x00'}, 0x8cb}) [ 2779.602701][ T319] loop4: p2 size 2 extends beyond EOD, truncated 23:19:19 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ff070400000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2779.646996][ T313] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2779.726959][ T313] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2779.803184][ T313] loop5: p2 < > 23:19:19 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000005004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x500, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2780.045765][ T345] ldm_validate_privheads(): Disk read failed. [ 2780.054857][ T345] loop4: p2 < > [ 2780.069372][ T338] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2780.083555][ T345] loop4: partition table partially beyond EOD, truncated [ 2780.123125][ T345] loop4: p2 size 2 extends beyond EOD, truncated [ 2780.180586][ T338] CPU: 1 PID: 338 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2780.189974][ T338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2780.200028][ T338] Call Trace: [ 2780.203328][ T338] dump_stack+0x197/0x210 [ 2780.207676][ T338] dump_header+0x177/0x1152 [ 2780.212192][ T338] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2780.218009][ T338] ? ___ratelimit+0x2c8/0x595 [ 2780.222692][ T338] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2780.228624][ T338] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2780.233923][ T338] ? trace_hardirqs_on+0x67/0x240 [ 2780.238962][ T338] ? pagefault_out_of_memory+0x11c/0x11c [ 2780.244607][ T338] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2780.250538][ T338] ? ___ratelimit+0x60/0x595 [ 2780.255132][ T338] ? do_raw_spin_unlock+0x181/0x270 [ 2780.260349][ T338] oom_kill_process.cold+0x10/0x15 [ 2780.265474][ T338] out_of_memory+0x334/0x13c0 [ 2780.270156][ T338] ? find_held_lock+0x35/0x130 [ 2780.274932][ T338] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 23:19:19 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000068000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2780.280751][ T338] ? oom_killer_disable+0x280/0x280 [ 2780.285980][ T338] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2780.291535][ T338] ? memcg_oom_wake_function+0x700/0x700 [ 2780.297196][ T338] ? do_raw_spin_unlock+0x181/0x270 [ 2780.302410][ T338] ? _raw_spin_unlock+0x28/0x40 [ 2780.307271][ T338] try_charge+0xeb1/0x13e0 [ 2780.311799][ T338] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2780.317360][ T338] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2780.322921][ T338] ? mem_cgroup_css_offline+0x330/0x330 [ 2780.328481][ T338] ? lock_downgrade+0x920/0x920 [ 2780.333355][ T338] mem_cgroup_try_charge+0x136/0x590 [ 2780.338658][ T338] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2780.344303][ T338] __handle_mm_fault+0x1f4a/0x3c20 [ 2780.349432][ T338] ? apply_to_existing_page_range+0x50/0x50 [ 2780.355330][ T338] ? handle_mm_fault+0x292/0xa50 [ 2780.360293][ T338] ? handle_mm_fault+0x7a0/0xa50 [ 2780.365244][ T338] ? __kasan_check_read+0x11/0x20 [ 2780.370278][ T338] handle_mm_fault+0x3b2/0xa50 [ 2780.375056][ T338] do_page_fault+0x545/0x12e1 [ 2780.379758][ T338] page_fault+0x39/0x40 [ 2780.383914][ T338] RIP: 0033:0x412b8f [ 2780.387811][ T338] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 2780.407411][ T338] RSP: 002b:00007ffef1e63010 EFLAGS: 00010206 [ 2780.413479][ T338] RAX: 00007fda7d211000 RBX: 0000000000020000 RCX: 000000000045b3ea [ 2780.421451][ T338] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 2780.429426][ T338] RBP: 00007ffef1e630f0 R08: ffffffffffffffff R09: 0000000000000000 [ 2780.437397][ T338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef1e631e0 [ 2780.445371][ T338] R13: 00007fda7d231700 R14: 0000000000000001 R15: 000000000075bfd4 [ 2780.520560][ T338] memory: usage 307200kB, limit 307200kB, failcnt 7879 [ 2780.610685][ T338] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2780.651888][ T338] Memory cgroup stats for /syz2: [ 2780.651984][ T338] anon 252428288 [ 2780.651984][ T338] file 77824 [ 2780.651984][ T338] kernel_stack 8589312 [ 2780.651984][ T338] slab 18128896 [ 2780.651984][ T338] sock 147456 [ 2780.651984][ T338] shmem 0 [ 2780.651984][ T338] file_mapped 0 [ 2780.651984][ T338] file_dirty 0 [ 2780.651984][ T338] file_writeback 0 [ 2780.651984][ T338] anon_thp 218103808 [ 2780.651984][ T338] inactive_anon 135168 [ 2780.651984][ T338] active_anon 252338176 [ 2780.651984][ T338] inactive_file 65536 23:19:20 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:20 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000006004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:20 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000080400000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2780.651984][ T338] active_file 28672 [ 2780.651984][ T338] unevictable 0 [ 2780.651984][ T338] slab_reclaimable 2973696 [ 2780.651984][ T338] slab_unreclaimable 15155200 [ 2780.651984][ T338] pgfault 196482 [ 2780.651984][ T338] pgmajfault 0 [ 2780.651984][ T338] workingset_refault 33 [ 2780.651984][ T338] workingset_activate 0 [ 2780.651984][ T338] workingset_nodereclaim 0 [ 2780.651984][ T338] pgrefill 26000 [ 2780.651984][ T338] pgscan 25670 [ 2780.651984][ T338] pgsteal 225 [ 2780.753461][ T338] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=32738,uid=0 [ 2780.790301][ T338] Memory cgroup out of memory: Killed process 32738 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2780.816280][ T358] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2780.914149][ T1136] oom_reaper: reaped process 32738 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 2780.939268][ T358] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2780.972929][ T358] loop5: p2 < > [ 2781.009075][ T342] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2781.021542][ T342] CPU: 1 PID: 342 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2781.030923][ T342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2781.040976][ T342] Call Trace: [ 2781.044273][ T342] dump_stack+0x197/0x210 [ 2781.048627][ T342] dump_header+0x177/0x1152 [ 2781.053164][ T342] ? pagefault_out_of_memory+0x11c/0x11c [ 2781.058803][ T342] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2781.064614][ T342] ? ___ratelimit+0x60/0x595 [ 2781.069211][ T342] ? do_raw_spin_unlock+0x181/0x270 [ 2781.074418][ T342] oom_kill_process.cold+0x10/0x15 [ 2781.079542][ T342] out_of_memory+0x334/0x13c0 [ 2781.084238][ T342] ? oom_killer_disable+0x280/0x280 [ 2781.089430][ T342] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2781.095063][ T342] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2781.100605][ T342] ? memcg_oom_wake_function+0x700/0x700 [ 2781.106219][ T342] ? retint_kernel+0x2b/0x2b [ 2781.110814][ T342] try_charge+0x98f/0x13e0 [ 2781.115215][ T342] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2781.120746][ T342] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2781.126279][ T342] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2781.131813][ T342] ? lock_downgrade+0x920/0x920 [ 2781.136660][ T342] ? __kasan_check_read+0x11/0x20 [ 2781.141679][ T342] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2781.147226][ T342] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2781.152591][ T342] ? retint_kernel+0x2b/0x2b [ 2781.157181][ T342] __memcg_kmem_charge+0x13a/0x3a0 [ 2781.162287][ T342] copy_process+0x42bb/0x7290 [ 2781.166952][ T342] ? __kasan_check_read+0x11/0x20 [ 2781.171962][ T342] ? mark_lock+0xc2/0x1220 [ 2781.176401][ T342] ? __cleanup_sighand+0xc0/0xc0 [ 2781.181334][ T342] ? __might_fault+0x12b/0x1e0 [ 2781.186105][ T342] ? __might_fault+0x12b/0x1e0 [ 2781.190886][ T342] _do_fork+0x146/0x1090 [ 2781.195119][ T342] ? copy_init_mm+0x20/0x20 [ 2781.199624][ T342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2781.205853][ T342] ? debug_smp_processor_id+0x33/0x18a [ 2781.211299][ T342] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2781.217446][ T342] __x64_sys_clone+0x19a/0x260 [ 2781.222201][ T342] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2781.228170][ T342] ? __ia32_sys_vfork+0xd0/0xd0 [ 2781.233024][ T342] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2781.238311][ T342] ? trace_hardirqs_on+0x67/0x240 [ 2781.243351][ T342] do_syscall_64+0xfa/0x790 [ 2781.247848][ T342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2781.253721][ T342] RIP: 0033:0x45b399 [ 2781.257601][ T342] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2781.277186][ T342] RSP: 002b:00007fda7d251c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2781.285581][ T342] RAX: ffffffffffffffda RBX: 00007fda7d2526d4 RCX: 000000000045b399 [ 2781.293535][ T342] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000080000000 [ 2781.301489][ T342] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 2781.309464][ T342] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2781.317415][ T342] R13: 0000000000000070 R14: 00000000004c1c24 R15: 000000000075bf2c [ 2781.361556][ T369] ldm_validate_privheads(): Disk read failed. [ 2781.364378][ T342] memory: usage 304904kB, limit 307200kB, failcnt 7882 [ 2781.367969][ T369] loop4: p2 < > [ 2781.448675][ T342] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:19:20 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000040800000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2781.495046][ T369] loop4: partition table partially beyond EOD, truncated 23:19:21 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000006c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2781.552732][ T369] loop4: p2 size 2 extends beyond EOD, truncated 23:19:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x600, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2781.711996][ T342] Memory cgroup stats for /syz2: [ 2781.713461][ T342] anon 250261504 [ 2781.713461][ T342] file 77824 [ 2781.713461][ T342] kernel_stack 8626176 [ 2781.713461][ T342] slab 18128896 [ 2781.713461][ T342] sock 147456 [ 2781.713461][ T342] shmem 0 [ 2781.713461][ T342] file_mapped 0 [ 2781.713461][ T342] file_dirty 0 [ 2781.713461][ T342] file_writeback 0 [ 2781.713461][ T342] anon_thp 216006656 [ 2781.713461][ T342] inactive_anon 135168 [ 2781.713461][ T342] active_anon 250171392 [ 2781.713461][ T342] inactive_file 65536 [ 2781.713461][ T342] active_file 28672 [ 2781.713461][ T342] unevictable 0 [ 2781.713461][ T342] slab_reclaimable 2973696 [ 2781.713461][ T342] slab_unreclaimable 15155200 [ 2781.713461][ T342] pgfault 196515 [ 2781.713461][ T342] pgmajfault 0 [ 2781.713461][ T342] workingset_refault 33 [ 2781.713461][ T342] workingset_activate 0 [ 2781.713461][ T342] workingset_nodereclaim 0 [ 2781.713461][ T342] pgrefill 26034 [ 2781.713461][ T342] pgscan 25670 [ 2781.713461][ T342] pgsteal 225 23:19:21 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000007004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2781.872324][ T342] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12368,uid=0 [ 2782.082125][ T342] Memory cgroup out of memory: Killed process 12368 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2782.195673][ T400] ldm_validate_privheads(): Disk read failed. [ 2782.208661][ T394] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2782.210832][ T400] loop4: p2 < > [ 2782.221437][ T394] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2782.257695][ T394] loop5: p2 < > [ 2782.266197][ T400] loop4: partition table partially beyond EOD, truncated [ 2782.315092][ T400] loop4: p2 size 2 extends beyond EOD, truncated 23:19:22 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r5, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r5, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @empty}, &(0x7f00000000c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={@rand_addr="b688fe72d5886655f007dd085cbc983e", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @remote}, 0x20000, 0x0, 0x401, 0x400, 0x8, 0xc, r6}) wait4(0x0, 0x0, 0x80000000, 0x0) r7 = getpid() tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:22 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:22 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffff0f00000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xe80, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:22 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000009004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:22 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000074000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2782.899016][ T427] ldm_validate_privheads(): Disk read failed. [ 2782.911318][ T427] loop4: p2 < > [ 2782.929816][ T427] loop4: partition table partially beyond EOD, truncated 23:19:22 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2782.980235][ T427] loop4: p2 size 2 extends beyond EOD, truncated 23:19:22 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f00000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2783.067237][ T428] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2783.101062][ T428] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:22 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x28800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2783.121797][ T428] loop5: p2 < > 23:19:22 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000a004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:22 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2783.445672][ T455] ldm_validate_privheads(): Disk read failed. 23:19:22 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000007a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:23 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000008100000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2783.542907][ T455] loop4: p2 < > [ 2783.582518][ T455] loop4: partition table partially beyond EOD, truncated [ 2783.589882][ T455] loop4: p2 size 2 extends beyond EOD, truncated 23:19:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1100, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:23 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:23 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000009000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:23 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:23 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2784.123098][ T472] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2784.180700][ T472] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:23 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000001000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2784.236758][ T492] ldm_validate_privheads(): Disk read failed. [ 2784.286353][ T472] loop5: p2 < > [ 2784.346652][ T492] loop4: p2 < > [ 2784.381774][ T492] loop4: partition table partially beyond EOD, truncated 23:19:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2900, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2784.470597][ T492] loop4: p2 size 2 extends beyond EOD, truncated 23:19:24 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='\xde{\x00', 0x80, 0x15a, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x9}) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:24 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:24 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f01000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:24 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000064ad000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:24 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000e910004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:24 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x3a041, 0xe8) write$apparmor_exec(r1, &(0x7f00000000c0)={'exec ', 'em0keyring\x00'}, 0x10) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:24 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2785.094979][ T530] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2785.105536][ T530] CPU: 0 PID: 530 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2785.114941][ T530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2785.124995][ T530] Call Trace: [ 2785.128308][ T530] dump_stack+0x197/0x210 [ 2785.132654][ T530] dump_header+0x177/0x1152 [ 2785.137169][ T530] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2785.142990][ T530] ? ___ratelimit+0x2c8/0x595 [ 2785.147677][ T530] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2785.153498][ T530] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2785.158790][ T530] ? trace_hardirqs_on+0x67/0x240 [ 2785.163826][ T530] ? pagefault_out_of_memory+0x11c/0x11c [ 2785.169547][ T530] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2785.175361][ T530] ? ___ratelimit+0x60/0x595 [ 2785.180071][ T530] ? do_raw_spin_unlock+0x181/0x270 [ 2785.185283][ T530] oom_kill_process.cold+0x10/0x15 [ 2785.190408][ T530] out_of_memory+0x334/0x13c0 [ 2785.195088][ T530] ? find_held_lock+0x35/0x130 [ 2785.199875][ T530] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2785.205695][ T530] ? oom_killer_disable+0x280/0x280 [ 2785.210909][ T530] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2785.216569][ T530] ? memcg_oom_wake_function+0x700/0x700 [ 2785.222213][ T530] ? do_raw_spin_unlock+0x181/0x270 [ 2785.227421][ T530] ? _raw_spin_unlock+0x28/0x40 [ 2785.232384][ T530] try_charge+0xeb1/0x13e0 [ 2785.236803][ T530] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2785.242365][ T530] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2785.247927][ T530] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2785.253491][ T530] ? lock_downgrade+0x920/0x920 [ 2785.258355][ T530] ? __kasan_check_read+0x11/0x20 [ 2785.263401][ T530] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2785.268963][ T530] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2785.274349][ T530] ? do_raw_spin_unlock+0x181/0x270 [ 2785.279583][ T530] __memcg_kmem_charge+0x13a/0x3a0 [ 2785.284812][ T530] copy_process+0x42bb/0x7290 [ 2785.289531][ T530] ? __kasan_check_read+0x11/0x20 [ 2785.294584][ T530] ? mark_lock+0xc2/0x1220 [ 2785.299125][ T530] ? __cleanup_sighand+0xc0/0xc0 [ 2785.304069][ T530] ? __might_fault+0x12b/0x1e0 [ 2785.308846][ T530] ? __might_fault+0x12b/0x1e0 [ 2785.313637][ T530] _do_fork+0x146/0x1090 [ 2785.317895][ T530] ? copy_init_mm+0x20/0x20 [ 2785.322414][ T530] ? __kasan_check_read+0x11/0x20 [ 2785.327441][ T530] ? _copy_to_user+0x118/0x160 [ 2785.332234][ T530] __x64_sys_clone+0x19a/0x260 [ 2785.337013][ T530] ? __ia32_sys_vfork+0xd0/0xd0 [ 2785.341892][ T530] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2785.347196][ T530] ? trace_hardirqs_on+0x67/0x240 [ 2785.352243][ T530] do_syscall_64+0xfa/0x790 [ 2785.356766][ T530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2785.362667][ T530] RIP: 0033:0x45b399 [ 2785.366563][ T530] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2785.386162][ T530] RSP: 002b:00007fda7d230c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2785.394679][ T530] RAX: ffffffffffffffda RBX: 00007fda7d2316d4 RCX: 000000000045b399 [ 2785.402648][ T530] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000004340100 [ 2785.410623][ T530] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 2785.418595][ T530] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2785.426744][ T530] R13: 0000000000000070 R14: 00000000004c1c24 R15: 000000000075bfd4 [ 2785.439924][ T530] memory: usage 307200kB, limit 307200kB, failcnt 7956 [ 2785.447264][ T530] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2785.454596][ T530] Memory cgroup stats for /syz2: [ 2785.454723][ T530] anon 252448768 [ 2785.454723][ T530] file 77824 [ 2785.454723][ T530] kernel_stack 8626176 [ 2785.454723][ T530] slab 18128896 [ 2785.454723][ T530] sock 147456 [ 2785.454723][ T530] shmem 0 [ 2785.454723][ T530] file_mapped 0 [ 2785.454723][ T530] file_dirty 0 [ 2785.454723][ T530] file_writeback 0 [ 2785.454723][ T530] anon_thp 218103808 [ 2785.454723][ T530] inactive_anon 135168 [ 2785.454723][ T530] active_anon 252485632 [ 2785.454723][ T530] inactive_file 65536 [ 2785.454723][ T530] active_file 28672 [ 2785.454723][ T530] unevictable 0 [ 2785.454723][ T530] slab_reclaimable 2973696 [ 2785.454723][ T530] slab_unreclaimable 15155200 [ 2785.454723][ T530] pgfault 196812 [ 2785.454723][ T530] pgmajfault 0 [ 2785.454723][ T530] workingset_refault 33 [ 2785.454723][ T530] workingset_activate 0 [ 2785.454723][ T530] workingset_nodereclaim 0 [ 2785.454723][ T530] pgrefill 26368 [ 2785.454723][ T530] pgscan 25979 [ 2785.454723][ T530] pgsteal 225 [ 2785.573763][ T529] ldm_validate_privheads(): Disk read failed. [ 2785.580155][ T529] loop4: p2 < > 23:19:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2b00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2785.614597][ T529] loop4: partition table partially beyond EOD, truncated [ 2785.622389][ T529] loop4: p2 size 2 extends beyond EOD, truncated [ 2785.631281][ T515] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2785.674960][ T515] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2785.688534][ T515] loop5: p2 < > 23:19:25 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000002000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:25 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000001f004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:25 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffffee000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2785.870121][ T530] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=436,uid=0 [ 2786.000952][ T530] Memory cgroup out of memory: Killed process 436 (syz-executor.2) total-vm:72724kB, anon-rss:4256kB, file-rss:35804kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 2786.091433][ T560] ldm_validate_privheads(): Disk read failed. [ 2786.123224][ T560] loop4: p2 < > [ 2786.128525][ T526] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2786.189493][ T560] loop4: partition table partially beyond EOD, truncated [ 2786.259880][ T526] CPU: 1 PID: 526 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2786.269283][ T526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2786.279338][ T526] Call Trace: [ 2786.282646][ T526] dump_stack+0x197/0x210 [ 2786.287001][ T526] dump_header+0x177/0x1152 [ 2786.291516][ T526] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2786.297340][ T526] ? ___ratelimit+0x2c8/0x595 [ 2786.302025][ T526] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2786.307893][ T526] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2786.313194][ T526] ? trace_hardirqs_on+0x67/0x240 [ 2786.318332][ T526] ? pagefault_out_of_memory+0x11c/0x11c [ 2786.323982][ T526] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2786.327704][ T560] loop4: p2 size 2 extends beyond EOD, truncated [ 2786.329795][ T526] ? ___ratelimit+0x60/0x595 [ 2786.329812][ T526] ? do_raw_spin_unlock+0x181/0x270 [ 2786.329839][ T526] oom_kill_process.cold+0x10/0x15 [ 2786.329861][ T526] out_of_memory+0x334/0x13c0 [ 2786.329880][ T526] ? find_held_lock+0x35/0x130 23:19:25 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f02000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:25 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2786.360528][ T526] ? oom_killer_disable+0x280/0x280 [ 2786.365792][ T526] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2786.371342][ T526] ? memcg_oom_wake_function+0x700/0x700 [ 2786.376980][ T526] ? do_raw_spin_unlock+0x181/0x270 [ 2786.382171][ T526] ? _raw_spin_unlock+0x28/0x40 [ 2786.387028][ T526] try_charge+0x98f/0x13e0 [ 2786.391551][ T526] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2786.397129][ T526] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2786.402690][ T526] ? mem_cgroup_css_offline+0x330/0x330 [ 2786.408262][ T526] mem_cgroup_try_charge+0x136/0x590 [ 2786.413674][ T526] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2786.419321][ T526] wp_page_copy+0x421/0x1610 [ 2786.423929][ T526] ? find_held_lock+0x35/0x130 [ 2786.428717][ T526] ? follow_pfn+0x2a0/0x2a0 [ 2786.433326][ T526] ? lock_downgrade+0x920/0x920 [ 2786.438206][ T526] ? swp_swapcount+0x540/0x540 [ 2786.443008][ T526] ? do_raw_spin_unlock+0x181/0x270 [ 2786.448221][ T526] do_wp_page+0x499/0x1440 [ 2786.452659][ T526] ? finish_mkwrite_fault+0x5c0/0x5c0 [ 2786.458060][ T526] __handle_mm_fault+0x1be9/0x3c20 [ 2786.463180][ T526] ? apply_to_existing_page_range+0x50/0x50 [ 2786.469072][ T526] ? handle_mm_fault+0x292/0xa50 [ 2786.474043][ T526] ? handle_mm_fault+0x7a0/0xa50 [ 2786.479091][ T526] ? __kasan_check_read+0x11/0x20 [ 2786.484129][ T526] handle_mm_fault+0x3b2/0xa50 [ 2786.488916][ T526] do_page_fault+0x545/0x12e1 [ 2786.493684][ T526] page_fault+0x39/0x40 [ 2786.497943][ T526] RIP: 0033:0x40dd98 [ 2786.501852][ T526] Code: d9 48 8b 47 78 48 83 f8 ff 0f 84 0b 01 00 00 48 8b 73 18 48 83 fe ff 74 29 48 81 fe e7 03 00 00 0f 87 67 01 00 00 48 c1 e6 04 86 80 80 75 00 01 48 89 86 88 80 75 00 66 2e 0f 1f 84 00 00 00 [ 2786.521468][ T526] RSP: 002b:00007ffef1e630d0 EFLAGS: 00010202 [ 2786.527532][ T526] RAX: 0000000000000007 RBX: 000000000075bf20 RCX: 0000000000000001 [ 2786.535502][ T526] RDX: 0000000000000001 RSI: 0000000000000010 RDI: 000000000075bf20 [ 2786.543493][ T526] RBP: 000000000075c9a0 R08: ffffffffffffffff R09: ffffffffffffffff [ 2786.551472][ T526] R10: 00007ffef1e631d0 R11: 0000000000000246 R12: 000000000075bfc8 [ 2786.559443][ T526] R13: 00000000002a7ec9 R14: 00000000002a7ef6 R15: 000000000075bfd4 [ 2786.609638][ T564] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2786.630657][ T564] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2786.677184][ T564] loop5: p2 < > 23:19:26 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000020004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2c00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:26 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2786.821312][ T526] memory: usage 302748kB, limit 307200kB, failcnt 7956 [ 2786.828189][ T526] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2786.850672][ T526] Memory cgroup stats for /syz2: [ 2786.850777][ T526] anon 248221696 [ 2786.850777][ T526] file 77824 [ 2786.850777][ T526] kernel_stack 8663040 [ 2786.850777][ T526] slab 18128896 [ 2786.850777][ T526] sock 147456 [ 2786.850777][ T526] shmem 0 [ 2786.850777][ T526] file_mapped 0 [ 2786.850777][ T526] file_dirty 0 [ 2786.850777][ T526] file_writeback 0 [ 2786.850777][ T526] anon_thp 213909504 [ 2786.850777][ T526] inactive_anon 135168 [ 2786.850777][ T526] active_anon 248258560 [ 2786.850777][ T526] inactive_file 65536 [ 2786.850777][ T526] active_file 28672 [ 2786.850777][ T526] unevictable 0 [ 2786.850777][ T526] slab_reclaimable 2973696 [ 2786.850777][ T526] slab_unreclaimable 15155200 [ 2786.850777][ T526] pgfault 196812 [ 2786.850777][ T526] pgmajfault 0 [ 2786.850777][ T526] workingset_refault 33 [ 2786.850777][ T526] workingset_activate 0 [ 2786.850777][ T526] workingset_nodereclaim 0 [ 2786.850777][ T526] pgrefill 26368 [ 2786.850777][ T526] pgscan 25979 [ 2786.850777][ T526] pgsteal 225 [ 2786.960531][ T526] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12344,uid=0 [ 2786.989176][ T526] Memory cgroup out of memory: Killed process 12344 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2787.008655][ T1136] oom_reaper: reaped process 12344 (syz-executor.2), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB 23:19:26 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fffffff5000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2787.102512][ T581] ldm_validate_privheads(): Disk read failed. [ 2787.115849][ T581] loop4: p2 < > 23:19:26 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x84000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000000)={0x7, 'macvlan0\x00', {0xb0}, 0x8e71}) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2787.174350][ T581] loop4: partition table partially beyond EOD, truncated 23:19:26 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000003000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2787.233939][ T581] loop4: p2 size 2 extends beyond EOD, truncated 23:19:26 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2787.315126][ T602] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 23:19:26 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000023004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2787.439345][ T611] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 23:19:26 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2787.487384][ T597] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2787.521342][ T597] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2787.531562][ T597] loop5: p2 < > 23:19:27 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r3, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) sendto$inet(r3, &(0x7f00000012c0)='\r', 0x1, 0x11, 0x0, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f0000000000), &(0x7f00000000c0)=0x4) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2787.734455][ T617] ldm_validate_privheads(): Disk read failed. [ 2787.752757][ T617] loop4: p2 < > 23:19:27 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f03000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2787.778133][ T617] loop4: partition table partially beyond EOD, truncated 23:19:27 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:27 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fffffffb000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2787.851927][ T617] loop4: p2 size 2 extends beyond EOD, truncated 23:19:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2f00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000003f004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2788.172552][ T641] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2788.197413][ T641] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:27 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:27 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept4$unix(r2, &(0x7f00000000c0), &(0x7f0000000000)=0x6e, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000140)={0xc016, 0x0, 0x4, 0x0, 0x0, [{{}, 0x1ff}, {{r0}, 0x4}, {{r5}, 0x4ba8}, {{}, 0x1}]}) r7 = getpid() tkill(r7, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r11, 0x6, 0x21, &(0x7f00000002c0)="d1b99a4ce1b5721810f898918bc2ab09", 0x10) [ 2788.256571][ T641] loop5: p2 < > [ 2788.321167][ T648] ldm_validate_privheads(): Disk read failed. [ 2788.330974][ T648] loop4: p2 < > [ 2788.335788][ T648] loop4: partition table partially beyond EOD, truncated 23:19:27 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000004000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2788.396224][ T648] loop4: p2 size 2 extends beyond EOD, truncated 23:19:27 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:27 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000fff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:28 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000040004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:28 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x92000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r3, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 23:19:28 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3a00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:28 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='vlan0\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:28 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:28 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f04000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2788.994138][ T688] ldm_validate_privheads(): Disk read failed. [ 2789.029110][ T688] loop4: p2 < > [ 2789.057247][ T688] loop4: partition table partially beyond EOD, truncated [ 2789.091731][ T674] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:28 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2789.182247][ T688] loop4: p2 size 2 extends beyond EOD, truncated [ 2789.194342][ T674] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:28 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:28 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x20, 0x7fffffff) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000000)={r0}) bind$unix(r7, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2789.284620][ T674] loop5: p2 < > 23:19:28 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000048004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:28 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffefff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:29 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000005000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:29 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2789.569950][ T725] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2789.601167][ T725] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 23:19:29 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chroot(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0xfffffffffffff874) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_ENDIAN(0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) shutdown(0xffffffffffffffff, 0x0) [ 2789.681249][ T732] ldm_validate_privheads(): Disk read failed. [ 2789.687763][ T732] loop4: p2 < > [ 2789.701856][ T732] loop4: partition table partially beyond EOD, truncated [ 2789.720749][ T732] loop4: p2 size 2 extends beyond EOD, truncated 23:19:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3c00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:29 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000004c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2789.857037][ T743] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 23:19:29 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2789.930716][ T738] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2789.951549][ T738] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2789.972709][ T738] loop5: p2 < > 23:19:29 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f05000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:29 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0xae2, 0x80, {r1}, {r3}, 0x4, 0x5c5}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) setresuid(r4, r6, r8) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:29 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000003ffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2790.241083][ T764] ldm_validate_privheads(): Disk read failed. [ 2790.257078][ T764] loop4: p2 < > [ 2790.339922][ T764] loop4: partition table partially beyond EOD, truncated 23:19:29 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2790.424210][ T764] loop4: p2 size 2 extends beyond EOD, truncated 23:19:29 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x7}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:30 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000060004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2790.665402][ T795] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 2790.677620][ T795] CPU: 0 PID: 795 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2790.687003][ T795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2790.697059][ T795] Call Trace: [ 2790.700375][ T795] dump_stack+0x197/0x210 [ 2790.704731][ T795] dump_header+0x177/0x1152 [ 2790.709241][ T795] ? _raw_spin_unlock_irqrestore+0x66/0xe0 23:19:30 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2790.715058][ T795] ? ___ratelimit+0x2c8/0x595 [ 2790.719741][ T795] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2790.725555][ T795] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2790.730851][ T795] ? trace_hardirqs_on+0x67/0x240 [ 2790.735885][ T795] ? pagefault_out_of_memory+0x11c/0x11c [ 2790.741521][ T795] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2790.747348][ T795] ? ___ratelimit+0x60/0x595 [ 2790.751943][ T795] ? do_raw_spin_unlock+0x181/0x270 [ 2790.757155][ T795] oom_kill_process.cold+0x10/0x15 [ 2790.762280][ T795] out_of_memory+0x334/0x13c0 [ 2790.766985][ T795] ? find_held_lock+0x35/0x130 [ 2790.771762][ T795] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2790.777579][ T795] ? oom_killer_disable+0x280/0x280 [ 2790.782797][ T795] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2790.788347][ T795] ? memcg_oom_wake_function+0x700/0x700 [ 2790.793990][ T795] ? do_raw_spin_unlock+0x181/0x270 [ 2790.799197][ T795] ? _raw_spin_unlock+0x28/0x40 [ 2790.804060][ T795] try_charge+0xeb1/0x13e0 [ 2790.808478][ T795] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2790.814031][ T795] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2790.819578][ T795] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2790.825124][ T795] ? lock_downgrade+0x920/0x920 [ 2790.829982][ T795] ? __kasan_check_read+0x11/0x20 [ 2790.835017][ T795] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2790.840575][ T795] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2790.845951][ T795] ? __kasan_check_read+0x11/0x20 [ 2790.850990][ T795] ? copy_process+0x4434/0x7290 [ 2790.855851][ T795] ? _do_fork+0x146/0x1090 [ 2790.860282][ T795] __memcg_kmem_charge+0x13a/0x3a0 [ 2790.865401][ T795] copy_process+0x42bb/0x7290 [ 2790.870080][ T795] ? mem_cgroup_throttle_swaprate+0x196/0x669 [ 2790.876179][ T795] ? __cleanup_sighand+0xc0/0xc0 [ 2790.881114][ T795] ? lock_downgrade+0x920/0x920 [ 2790.885968][ T795] ? migration_entry_to_page+0x330/0x330 [ 2790.891610][ T795] ? lru_cache_add+0x236/0x5b0 [ 2790.896388][ T795] _do_fork+0x146/0x1090 [ 2790.900638][ T795] ? copy_init_mm+0x20/0x20 [ 2790.905166][ T795] ? lock_downgrade+0x920/0x920 [ 2790.910036][ T795] __x64_sys_clone+0x19a/0x260 [ 2790.914823][ T795] ? __ia32_sys_vfork+0xd0/0xd0 [ 2790.919696][ T795] ? down_read_non_owner+0x490/0x490 [ 2790.924995][ T795] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2790.930285][ T795] ? trace_hardirqs_on+0x67/0x240 [ 2790.935316][ T795] do_syscall_64+0xfa/0x790 [ 2790.939832][ T795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2790.945718][ T795] RIP: 0033:0x45dd69 [ 2790.949611][ T795] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2790.969210][ T795] RSP: 002b:00007ffef1e62fc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2790.977620][ T795] RAX: ffffffffffffffda RBX: 00007fda7d252700 RCX: 000000000045dd69 [ 2790.985591][ T795] RDX: 00007fda7d2529d0 RSI: 00007fda7d251db0 RDI: 00000000003d0f00 [ 2790.993557][ T795] RBP: 00007ffef1e631e0 R08: 00007fda7d252700 R09: 00007fda7d252700 [ 2791.001529][ T795] R10: 00007fda7d2529d0 R11: 0000000000000202 R12: 0000000000000000 [ 2791.009496][ T795] R13: 00007ffef1e6307f R14: 00007fda7d2529c0 R15: 000000000075bf2c [ 2791.019671][ T795] memory: usage 307200kB, limit 307200kB, failcnt 7978 [ 2791.026792][ T795] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2791.034007][ T795] Memory cgroup stats for /syz2: [ 2791.034133][ T795] anon 252362752 [ 2791.034133][ T795] file 77824 [ 2791.034133][ T795] kernel_stack 8626176 [ 2791.034133][ T795] slab 18128896 [ 2791.034133][ T795] sock 147456 [ 2791.034133][ T795] shmem 0 [ 2791.034133][ T795] file_mapped 0 [ 2791.034133][ T795] file_dirty 0 [ 2791.034133][ T795] file_writeback 0 [ 2791.034133][ T795] anon_thp 218103808 [ 2791.034133][ T795] inactive_anon 135168 [ 2791.034133][ T795] active_anon 252272640 [ 2791.034133][ T795] inactive_file 65536 [ 2791.034133][ T795] active_file 28672 [ 2791.034133][ T795] unevictable 0 [ 2791.034133][ T795] slab_reclaimable 2973696 [ 2791.034133][ T795] slab_unreclaimable 15155200 [ 2791.034133][ T795] pgfault 197538 [ 2791.034133][ T795] pgmajfault 0 [ 2791.034133][ T795] workingset_refault 33 [ 2791.034133][ T795] workingset_activate 0 [ 2791.034133][ T795] workingset_nodereclaim 0 [ 2791.034133][ T795] pgrefill 26368 [ 2791.034133][ T795] pgscan 26045 [ 2791.034133][ T795] pgsteal 258 [ 2791.129837][ T795] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=787,uid=0 [ 2791.152826][ T795] Memory cgroup out of memory: Killed process 787 (syz-executor.2) total-vm:72988kB, anon-rss:4272kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 23:19:30 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000006000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2791.187790][ T782] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2791.264141][ T782] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:30 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000030000117db28e652a8252a03000000003800010034000100090001006373756d00000000200002801c00010012000000000000000000000000000000000000000000000004000600"], 0x4c}}, 0x0) getpid() lstat(0x0, &(0x7f0000000780)) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000100)="b805000000b9510000000f01c10f46aacb00020066ba2100b067eeb9800000c00f3235000100000f308eb9800000c06832d6d6004000000fda3030c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x47}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() tkill(r5, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 23:19:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3f00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:30 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2791.341502][ T782] loop5: p2 < > [ 2791.359426][ T810] ldm_validate_privheads(): Disk read failed. [ 2791.372892][ T810] loop4: p2 < > [ 2791.440715][ T810] loop4: partition table partially beyond EOD, truncated [ 2791.447947][ T810] loop4: p2 size 2 extends beyond EOD, truncated 23:19:30 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffefffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:31 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:31 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000068004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:31 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f06000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:31 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2791.845370][ T840] ldm_validate_privheads(): Disk read failed. [ 2791.866209][ T840] loop4: p2 < > [ 2791.903362][ T840] loop4: partition table partially beyond EOD, truncated 23:19:31 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2791.970542][ T840] loop4: p2 size 2 extends beyond EOD, truncated 23:19:31 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000002c0)) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r3 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r3, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffffc0, 0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r5, 0x40485404, &(0x7f00000000c0)={{0x1, 0x2, 0xe67, 0x0, 0x3}, 0x0, 0x4}) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f00000001c0)=@usbdevfs_driver={0x80000001, 0x20, &(0x7f0000000180)="d7aa606feff2b0af242bbd15ae716419082f9d15a195aa314cef52f0a45bf905f0bfdb4b2984"}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x90102, 0x0) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2792.049692][ T835] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:31 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000006c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2792.120580][ T835] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2792.139987][ T835] loop5: p2 < > 23:19:31 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$ax25(r3, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:31 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mq_getsetattr(r3, &(0x7f00000000c0)={0xffffffffffff53ea, 0x57bc, 0x81, 0x3e4031ea}, &(0x7f0000000100)) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4800, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:31 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000007000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2792.382082][ T865] ldm_validate_privheads(): Disk read failed. [ 2792.450753][ T865] loop4: p2 < > [ 2792.476754][ T865] loop4: partition table partially beyond EOD, truncated 23:19:32 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00eeffffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:32 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2792.520722][ T865] loop4: p2 size 2 extends beyond EOD, truncated 23:19:32 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:32 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000074004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:32 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000000)={0x2, 0x6}) epoll_create1(0x80000) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r1, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x142b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1ff}, 0x4804, 0x0, 0x0, 0x2}, r1, 0x2, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0xc082, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r3, &(0x7f0000000040)=[{&(0x7f00000002c0)="e73b2ca797d29d33eeb7ed4e18f86a31351c877a8a343f6257baf601f84b81e89045a0538dc9efa04c19c13f6b1ff2cf03d408f27487de1d0c3d71cc76aac5b4235eac46d10a1377a36c7d174c72e3b715084ce2439253fd65131210253d3a3096baeaad428c0fcb2e362ef8a8db9350d6b272a6ba1c770fdb32f27cef0ca500000000000000000000000000576d1f78a044425f88b9866df40d2da2f9e0852ad9b1e71044cca95929e918f3e47e7f0470bd62aaafca49a8be9ca7551058bf8c224b01cf4cf48c3c21", 0xc9}], 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r4, 0xc0189436, &(0x7f00000000c0)=@get={0x1, 0x0, 0x2000000}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet(r7, &(0x7f0000000880)="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", 0x18a, 0x10055, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[]}, 0x1, 0x0, 0x0, 0x200400c0}, 0x804) socket$nl_netfilter(0x10, 0x3, 0xc) 23:19:32 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:32 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f07000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2793.049238][ T909] ldm_validate_privheads(): Disk read failed. [ 2793.056980][ T900] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2793.115569][ T909] loop4: p2 < > 23:19:32 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2793.161730][ T909] loop4: partition table partially beyond EOD, truncated [ 2793.176967][ T900] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x800e, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2793.235934][ T909] loop4: p2 size 2 extends beyond EOD, truncated [ 2793.250233][ T900] loop5: p2 < > 23:19:32 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000007a004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:32 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:32 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000008000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2793.551099][ T934] ldm_validate_privheads(): Disk read failed. [ 2793.557706][ T934] loop4: p2 < > [ 2793.579551][ T934] loop4: partition table partially beyond EOD, truncated [ 2793.610629][ T934] loop4: p2 size 2 extends beyond EOD, truncated 23:19:33 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00f5ffffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:33 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:33 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:33 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:33 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000090004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:33 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f08000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:33 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xff00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:33 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:33 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) r1 = semget(0x1, 0x0, 0x160) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f00000001c0)=""/142) semctl$SEM_STAT_ANY(r1, 0x4, 0x14, &(0x7f00000003c0)=""/136) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x40400, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000340)={0x40000100, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)=0x0, {0x2b}, &(0x7f0000000140)=""/90, 0x5a, &(0x7f00000002c0)=""/81, &(0x7f00000001c0)=[r2], 0x1}, 0x50) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0xb2f}, 0x0, 0xffffffffcb6e5da9}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x2, 0x0) r4 = getpid() tkill(r4, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000600)) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2794.128061][ T966] ldm_validate_privheads(): Disk read failed. [ 2794.146949][ T983] IPVS: ftp: loaded support on port[0] = 21 [ 2794.164086][ T966] loop4: p2 < > 23:19:33 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2794.220752][ T966] loop4: partition table partially beyond EOD, truncated [ 2794.259854][ T966] loop4: p2 size 2 extends beyond EOD, truncated 23:19:33 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCNXCL(r5, 0x540d) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2794.297790][ T957] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2794.333910][ T5107] tipc: TX() has been purged, node left! [ 2794.340081][ T957] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2794.350964][ T957] loop5: p2 < > 23:19:34 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fbffffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:34 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:34 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000009000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:34 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000010e9004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:34 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = accept4$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x80800) ioctl$FICLONE(r2, 0x40049409, r0) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) r5 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x210000) ioctl$USBDEVFS_REAPURBNDELAY(r5, 0x4008550d, &(0x7f00000000c0)) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:34 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:34 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f09000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2794.929640][ T1022] ldm_validate_privheads(): Disk read failed. [ 2794.940031][ T1022] loop4: p2 < > [ 2794.978728][ T1022] loop4: partition table partially beyond EOD, truncated [ 2795.073166][ T1022] loop4: p2 size 2 extends beyond EOD, truncated 23:19:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x2, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:34 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:34 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2795.175346][ T1024] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2795.241709][ T1024] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2795.302073][ T1024] loop5: p2 < > 23:19:34 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:34 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:35 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000fff004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:35 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:35 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000001000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:35 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r3, 0x4, 0xffffffffffffffff, 0x8) r4 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r4, 0x4, 0xffffffffffffffff, 0x8) r5 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r5, 0x4, 0xffffffffffffffff, 0x8) r6 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r6, 0x4, 0xffffffffffffffff, 0x8) r7 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r7, 0x4, 0xffffffffffffffff, 0x8) r8 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r8, 0x4, 0xffffffffffffffff, 0x8) clone3(&(0x7f00000007c0)={0x80002400, &(0x7f00000001c0), &(0x7f00000003c0)=0x0, &(0x7f0000000400), {0x18}, &(0x7f0000000440)=""/107, 0x6b, &(0x7f00000004c0)=""/218, &(0x7f00000005c0)=[r5, r6, r1, r7, r1, r8], 0x6}, 0x50) r10 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x2, 0x81, 0x8, 0x0, 0x100, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x10000}, 0x10000, 0x9, 0x8001, 0x1, 0xffff, 0x4, 0x1}, r10, 0x4, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r12, 0x0, r11) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000840)=0xc) clone3(&(0x7f00000008c0)={0x10001100, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), {0x4}, &(0x7f00000002c0)=""/226, 0xe2, &(0x7f0000000140)=""/123, &(0x7f0000000880)=[r1, r3, r4, 0xffffffffffffffff, r9, r10, r13, 0xffffffffffffffff], 0x8}, 0x50) [ 2795.693614][ T9644] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 2795.706112][ T9644] CPU: 1 PID: 9644 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2795.715574][ T9644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2795.725630][ T9644] Call Trace: [ 2795.728934][ T9644] dump_stack+0x197/0x210 [ 2795.733290][ T9644] dump_header+0x177/0x1152 [ 2795.737805][ T9644] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2795.743625][ T9644] ? ___ratelimit+0x2c8/0x595 [ 2795.748315][ T9644] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2795.754126][ T9644] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2795.759428][ T9644] ? trace_hardirqs_on+0x67/0x240 [ 2795.764465][ T9644] ? pagefault_out_of_memory+0x11c/0x11c [ 2795.770107][ T9644] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2795.775920][ T9644] ? ___ratelimit+0x60/0x595 [ 2795.780515][ T9644] ? do_raw_spin_unlock+0x181/0x270 [ 2795.785724][ T9644] oom_kill_process.cold+0x10/0x15 [ 2795.790846][ T9644] out_of_memory+0x334/0x13c0 [ 2795.795542][ T9644] ? find_held_lock+0x35/0x130 [ 2795.800326][ T9644] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2795.806142][ T9644] ? oom_killer_disable+0x280/0x280 [ 2795.811368][ T9644] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2795.816919][ T9644] ? memcg_oom_wake_function+0x700/0x700 [ 2795.822565][ T9644] ? do_raw_spin_unlock+0x181/0x270 [ 2795.827769][ T9644] ? _raw_spin_unlock+0x28/0x40 [ 2795.832632][ T9644] try_charge+0xeb1/0x13e0 [ 2795.837046][ T9644] ? get_mem_cgroup_from_mm+0x18d/0x4e0 [ 2795.842605][ T9644] ? get_mem_cgroup_from_mm+0x120/0x4e0 [ 2795.848159][ T9644] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2795.853708][ T9644] ? lock_downgrade+0x920/0x920 [ 2795.858580][ T9644] ? __kasan_check_read+0x11/0x20 [ 2795.863625][ T9644] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2795.869186][ T9644] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2795.874575][ T9644] ? __isolate_free_page+0x4c0/0x4c0 [ 2795.879870][ T9644] __memcg_kmem_charge+0x13a/0x3a0 [ 2795.885019][ T9644] __alloc_pages_nodemask+0x4f5/0x910 [ 2795.890397][ T9644] ? __pmd_alloc+0x377/0x460 [ 2795.895007][ T9644] ? __alloc_pages_slowpath+0x2900/0x2900 [ 2795.900722][ T9644] ? __pmd_alloc+0x377/0x460 [ 2795.905327][ T9644] ? lock_downgrade+0x920/0x920 [ 2795.910192][ T9644] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2795.916446][ T9644] alloc_pages_current+0x107/0x210 [ 2795.921571][ T9644] pte_alloc_one+0x1b/0x1a0 [ 2795.926087][ T9644] __pte_alloc+0x20/0x310 [ 2795.930441][ T9644] copy_page_range+0x1629/0x20e0 [ 2795.935380][ T9644] ? memcg_kmem_put_cache+0xad/0x1a0 [ 2795.940715][ T9644] ? vmf_insert_mixed_mkwrite+0x60/0x60 [ 2795.946268][ T9644] ? __rb_insert_augmented+0x20c/0xd90 [ 2795.951736][ T9644] ? validate_mm_rb+0xa3/0xc0 [ 2795.956426][ T9644] ? __vma_link_rb+0x5ad/0x770 [ 2795.961207][ T9644] dup_mm+0xa67/0x1430 [ 2795.965309][ T9644] ? vm_area_dup+0x170/0x170 [ 2795.969908][ T9644] ? debug_mutex_init+0x2d/0x60 [ 2795.974767][ T9644] copy_process+0x2987/0x7290 [ 2795.979439][ T9644] ? __kasan_check_read+0x11/0x20 [ 2795.984466][ T9644] ? mark_lock+0xc2/0x1220 [ 2795.988917][ T9644] ? __cleanup_sighand+0xc0/0xc0 [ 2795.993872][ T9644] ? __might_fault+0x12b/0x1e0 [ 2795.998653][ T9644] ? __might_fault+0x12b/0x1e0 [ 2796.003442][ T9644] _do_fork+0x146/0x1090 [ 2796.007694][ T9644] ? copy_init_mm+0x20/0x20 [ 2796.012217][ T9644] ? __kasan_check_read+0x11/0x20 [ 2796.017232][ T9644] ? _copy_to_user+0x118/0x160 [ 2796.021993][ T9644] __x64_sys_clone+0x19a/0x260 [ 2796.026744][ T9644] ? __ia32_sys_vfork+0xd0/0xd0 [ 2796.031593][ T9644] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2796.036877][ T9644] ? trace_hardirqs_on+0x67/0x240 [ 2796.041899][ T9644] do_syscall_64+0xfa/0x790 [ 2796.046395][ T9644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2796.052267][ T9644] RIP: 0033:0x45996a [ 2796.056147][ T9644] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 2796.075747][ T9644] RSP: 002b:00007ffef1e63260 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2796.084141][ T9644] RAX: ffffffffffffffda RBX: 00007ffef1e63260 RCX: 000000000045996a 23:19:35 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2796.092096][ T9644] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2796.100048][ T9644] RBP: 00007ffef1e632a0 R08: 0000000000000001 R09: 0000000002161940 [ 2796.108001][ T9644] R10: 0000000002161c10 R11: 0000000000000246 R12: 0000000000000001 [ 2796.115954][ T9644] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffef1e632f0 [ 2796.143578][ T9644] memory: usage 307200kB, limit 307200kB, failcnt 8041 [ 2796.160931][ T9644] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2796.170674][ T9644] Memory cgroup stats for /syz2: [ 2796.170805][ T9644] anon 250667008 [ 2796.170805][ T9644] file 77824 [ 2796.170805][ T9644] kernel_stack 8699904 [ 2796.170805][ T9644] slab 19394560 [ 2796.170805][ T9644] sock 147456 [ 2796.170805][ T9644] shmem 0 [ 2796.170805][ T9644] file_mapped 0 [ 2796.170805][ T9644] file_dirty 0 [ 2796.170805][ T9644] file_writeback 0 [ 2796.170805][ T9644] anon_thp 216006656 [ 2796.170805][ T9644] inactive_anon 135168 [ 2796.170805][ T9644] active_anon 250576896 [ 2796.170805][ T9644] inactive_file 65536 [ 2796.170805][ T9644] active_file 28672 [ 2796.170805][ T9644] unevictable 0 [ 2796.170805][ T9644] slab_reclaimable 3108864 [ 2796.170805][ T9644] slab_unreclaimable 16285696 [ 2796.170805][ T9644] pgfault 198396 [ 2796.170805][ T9644] pgmajfault 0 [ 2796.170805][ T9644] workingset_refault 33 [ 2796.170805][ T9644] workingset_activate 0 [ 2796.170805][ T9644] workingset_nodereclaim 0 [ 2796.170805][ T9644] pgrefill 26467 [ 2796.170805][ T9644] pgscan 26144 [ 2796.170805][ T9644] pgsteal 258 [ 2796.277623][ T9644] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=963,uid=0 23:19:35 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2796.318166][ T9644] Memory cgroup out of memory: Killed process 963 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2796.349813][ T1136] oom_reaper: reaped process 963 (syz-executor.2), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 2796.420689][ T1080] ldm_validate_privheads(): Disk read failed. [ 2796.440889][ T1080] loop4: p2 < > 23:19:35 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2796.469929][ T1080] loop4: partition table partially beyond EOD, truncated [ 2796.509131][ T1080] loop4: p2 size 2 extends beyond EOD, truncated 23:19:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x4, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:36 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0b000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2796.622915][ T1102] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:36 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2796.785214][ T1102] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:36 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000004300000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2796.866516][ T1102] loop5: p2 < > 23:19:36 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400, 0x0) ioctl$TIOCCBRK(r1, 0x5428) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x94, 0x0, 0x20000000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:36 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffffffffff07000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2797.021615][ T1119] loop4: p2 < > [ 2797.025353][ T1119] loop4: partition table partially beyond EOD, truncated [ 2797.047998][ T1119] loop4: p2 size 2 extends beyond EOD, truncated [ 2797.053068][ T1125] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=1000 23:19:36 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0041a9e50b000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:36 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2797.227434][ T1125] CPU: 0 PID: 1125 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2797.236938][ T1125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2797.246996][ T1125] Call Trace: [ 2797.250295][ T1125] dump_stack+0x197/0x210 [ 2797.254642][ T1125] dump_header+0x177/0x1152 [ 2797.259172][ T1125] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2797.264979][ T1125] ? ___ratelimit+0x2c8/0x595 [ 2797.269660][ T1125] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2797.275474][ T1125] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2797.280771][ T1125] ? trace_hardirqs_on+0x67/0x240 [ 2797.285807][ T1125] ? pagefault_out_of_memory+0x11c/0x11c [ 2797.291449][ T1125] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2797.297265][ T1125] ? ___ratelimit+0x60/0x595 [ 2797.301964][ T1125] ? do_raw_spin_unlock+0x181/0x270 [ 2797.307178][ T1125] oom_kill_process.cold+0x10/0x15 [ 2797.312301][ T1125] out_of_memory+0x334/0x13c0 [ 2797.316987][ T1125] ? find_held_lock+0x35/0x130 [ 2797.321765][ T1125] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2797.327585][ T1125] ? oom_killer_disable+0x280/0x280 [ 2797.332804][ T1125] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2797.338357][ T1125] ? memcg_oom_wake_function+0x700/0x700 [ 2797.344001][ T1125] ? do_raw_spin_unlock+0x181/0x270 [ 2797.349195][ T1125] ? _raw_spin_unlock+0x28/0x40 [ 2797.354051][ T1125] try_charge+0xeb1/0x13e0 [ 2797.358479][ T1125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2797.364717][ T1125] ? __check_heap_object+0x50/0xb3 [ 2797.369821][ T1125] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2797.375351][ T1125] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2797.380892][ T1125] ? cache_grow_begin+0x122/0xc60 [ 2797.385899][ T1125] ? find_held_lock+0x35/0x130 [ 2797.390659][ T1125] ? cache_grow_begin+0x122/0xc60 [ 2797.395671][ T1125] __memcg_kmem_charge_memcg+0x7c/0x130 [ 2797.401195][ T1125] ? lock_downgrade+0x920/0x920 [ 2797.406036][ T1125] ? memcg_kmem_put_cache+0x1a0/0x1a0 [ 2797.411406][ T1125] ? __kasan_check_read+0x11/0x20 [ 2797.416423][ T1125] cache_grow_begin+0x5e8/0xc60 [ 2797.421384][ T1125] ? __sanitizer_cov_trace_cmp8+0x11/0x20 23:19:36 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000004600000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2797.427092][ T1125] ? mempolicy_slab_node+0x139/0x390 [ 2797.432412][ T1125] fallback_alloc+0x1f8/0x2d0 [ 2797.437080][ T1125] ____cache_alloc_node+0x1bc/0x1d0 [ 2797.442266][ T1125] ? trace_hardirqs_off+0x62/0x240 [ 2797.447380][ T1125] kmem_cache_alloc_node+0xe3/0x740 [ 2797.452586][ T1125] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2797.457887][ T1125] ? trace_hardirqs_on+0x67/0x240 [ 2797.462925][ T1125] copy_process+0x5e7/0x7290 [ 2797.467521][ T1125] ? __kasan_check_read+0x11/0x20 [ 2797.472543][ T1125] ? mark_lock+0xc2/0x1220 [ 2797.476956][ T1125] ? __kasan_check_read+0x11/0x20 [ 2797.481965][ T1125] ? __lock_acquire+0x16f2/0x4a00 [ 2797.487090][ T1125] ? __cleanup_sighand+0xc0/0xc0 [ 2797.492035][ T1125] ? __might_fault+0x12b/0x1e0 [ 2797.496803][ T1125] ? __might_fault+0x12b/0x1e0 [ 2797.501560][ T1125] _do_fork+0x146/0x1090 [ 2797.505791][ T1125] ? copy_init_mm+0x20/0x20 [ 2797.510309][ T1125] ? __kasan_check_read+0x11/0x20 [ 2797.515331][ T1125] ? _copy_to_user+0x118/0x160 [ 2797.520163][ T1125] __x64_sys_clone+0x19a/0x260 [ 2797.524921][ T1125] ? __ia32_sys_vfork+0xd0/0xd0 [ 2797.529797][ T1125] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2797.535079][ T1125] ? trace_hardirqs_on+0x67/0x240 [ 2797.540096][ T1125] do_syscall_64+0xfa/0x790 [ 2797.544598][ T1125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2797.550480][ T1125] RIP: 0033:0x45b399 [ 2797.554370][ T1125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2797.573954][ T1125] RSP: 002b:00007fda7d251c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2797.582357][ T1125] RAX: ffffffffffffffda RBX: 00007fda7d2526d4 RCX: 000000000045b399 [ 2797.590322][ T1125] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000004340100 [ 2797.598331][ T1125] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 2797.606294][ T1125] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 2797.614251][ T1125] R13: 0000000000000070 R14: 00000000004c1c24 R15: 000000000075bf2c [ 2797.658667][ T1133] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2797.703489][ T1125] memory: usage 307196kB, limit 307200kB, failcnt 8065 [ 2797.705219][ T1133] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2797.725498][ T1133] loop5: p2 < > [ 2797.733089][ T1125] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2797.746710][ T1133] loop5: partition table partially beyond EOD, truncated [ 2797.773166][ T1133] loop5: p2 start 4294967295 is beyond EOD, truncated [ 2797.780617][ T1125] Memory cgroup stats for /syz2: [ 2797.780747][ T1125] anon 250744832 [ 2797.780747][ T1125] file 77824 [ 2797.780747][ T1125] kernel_stack 8699904 [ 2797.780747][ T1125] slab 19394560 [ 2797.780747][ T1125] sock 147456 [ 2797.780747][ T1125] shmem 0 [ 2797.780747][ T1125] file_mapped 0 [ 2797.780747][ T1125] file_dirty 0 [ 2797.780747][ T1125] file_writeback 0 [ 2797.780747][ T1125] anon_thp 216006656 [ 2797.780747][ T1125] inactive_anon 135168 [ 2797.780747][ T1125] active_anon 250744832 [ 2797.780747][ T1125] inactive_file 65536 [ 2797.780747][ T1125] active_file 28672 [ 2797.780747][ T1125] unevictable 0 [ 2797.780747][ T1125] slab_reclaimable 3108864 [ 2797.780747][ T1125] slab_unreclaimable 16285696 [ 2797.780747][ T1125] pgfault 198528 [ 2797.780747][ T1125] pgmajfault 0 [ 2797.780747][ T1125] workingset_refault 33 [ 2797.780747][ T1125] workingset_activate 0 [ 2797.780747][ T1125] workingset_nodereclaim 0 [ 2797.780747][ T1125] pgrefill 26500 [ 2797.780747][ T1125] pgscan 26177 23:19:37 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2797.780747][ T1125] pgsteal 258 [ 2797.912529][ T1161] loop4: p2 < > [ 2797.919712][ T1161] loop4: partition table partially beyond EOD, truncated [ 2797.924188][ T1125] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=715,uid=0 [ 2797.942838][ T1161] loop4: p2 size 2 extends beyond EOD, truncated 23:19:37 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2797.949216][ T1125] Memory cgroup out of memory: Killed process 715 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2797.958617][ T1122] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:19:37 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000090000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2798.063865][ T1122] CPU: 0 PID: 1122 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2798.073338][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2798.083389][ T1122] Call Trace: [ 2798.086690][ T1122] dump_stack+0x197/0x210 [ 2798.091035][ T1122] dump_header+0x177/0x1152 [ 2798.095546][ T1122] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2798.101357][ T1122] ? ___ratelimit+0x2c8/0x595 [ 2798.106042][ T1122] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2798.111856][ T1122] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2798.117152][ T1122] ? trace_hardirqs_on+0x67/0x240 [ 2798.122195][ T1122] ? pagefault_out_of_memory+0x11c/0x11c [ 2798.127893][ T1122] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2798.133709][ T1122] ? ___ratelimit+0x60/0x595 [ 2798.138301][ T1122] ? do_raw_spin_unlock+0x181/0x270 [ 2798.143510][ T1122] oom_kill_process.cold+0x10/0x15 [ 2798.148635][ T1122] out_of_memory+0x334/0x13c0 [ 2798.153318][ T1122] ? find_held_lock+0x35/0x130 [ 2798.158103][ T1122] ? oom_killer_disable+0x280/0x280 [ 2798.163327][ T1122] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2798.168881][ T1122] ? memcg_oom_wake_function+0x700/0x700 [ 2798.174539][ T1122] ? do_raw_spin_unlock+0x181/0x270 [ 2798.179745][ T1122] ? _raw_spin_unlock+0x28/0x40 [ 2798.184605][ T1122] try_charge+0x98f/0x13e0 [ 2798.189045][ T1122] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2798.194628][ T1122] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2798.200198][ T1122] ? mem_cgroup_css_offline+0x330/0x330 [ 2798.205745][ T1122] ? lock_downgrade+0x920/0x920 [ 2798.210612][ T1122] mem_cgroup_try_charge+0x136/0x590 [ 2798.215913][ T1122] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2798.221567][ T1122] __handle_mm_fault+0x1f4a/0x3c20 [ 2798.226695][ T1122] ? apply_to_existing_page_range+0x50/0x50 [ 2798.232595][ T1122] ? handle_mm_fault+0x292/0xa50 [ 2798.237553][ T1122] ? handle_mm_fault+0x7a0/0xa50 [ 2798.242528][ T1122] ? __kasan_check_read+0x11/0x20 [ 2798.247565][ T1122] handle_mm_fault+0x3b2/0xa50 [ 2798.252338][ T1122] do_page_fault+0x545/0x12e1 [ 2798.257040][ T1122] page_fault+0x39/0x40 [ 2798.261201][ T1122] RIP: 0033:0x412b8f [ 2798.265096][ T1122] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 2798.284698][ T1122] RSP: 002b:00007ffef1e63010 EFLAGS: 00010206 [ 2798.290759][ T1122] RAX: 00007fda7d211000 RBX: 0000000000020000 RCX: 000000000045b3ea [ 2798.298826][ T1122] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 2798.306795][ T1122] RBP: 00007ffef1e630f0 R08: ffffffffffffffff R09: 0000000000000000 23:19:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x6, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2798.314766][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef1e631e0 [ 2798.322732][ T1122] R13: 00007fda7d231700 R14: 0000000000000001 R15: 000000000075bfd4 23:19:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2798.420324][ T1172] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2798.431113][ T1172] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2798.442984][ T1122] memory: usage 304856kB, limit 307200kB, failcnt 8065 [ 2798.464652][ T1172] loop5: p2 < > 23:19:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2798.574809][ T1122] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2798.590055][ T1122] Memory cgroup stats for /syz2: [ 2798.590178][ T1122] anon 248504320 [ 2798.590178][ T1122] file 77824 [ 2798.590178][ T1122] kernel_stack 8663040 [ 2798.590178][ T1122] slab 19394560 [ 2798.590178][ T1122] sock 147456 [ 2798.590178][ T1122] shmem 0 [ 2798.590178][ T1122] file_mapped 0 [ 2798.590178][ T1122] file_dirty 0 [ 2798.590178][ T1122] file_writeback 0 [ 2798.590178][ T1122] anon_thp 213909504 [ 2798.590178][ T1122] inactive_anon 135168 [ 2798.590178][ T1122] active_anon 248504320 [ 2798.590178][ T1122] inactive_file 65536 [ 2798.590178][ T1122] active_file 28672 [ 2798.590178][ T1122] unevictable 0 [ 2798.590178][ T1122] slab_reclaimable 3108864 [ 2798.590178][ T1122] slab_unreclaimable 16285696 [ 2798.590178][ T1122] pgfault 198528 [ 2798.590178][ T1122] pgmajfault 0 [ 2798.590178][ T1122] workingset_refault 33 [ 2798.590178][ T1122] workingset_activate 0 [ 2798.590178][ T1122] workingset_nodereclaim 0 23:19:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000004e00000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2798.590178][ T1122] pgrefill 26500 [ 2798.590178][ T1122] pgscan 26177 [ 2798.590178][ T1122] pgsteal 258 [ 2798.859102][ T1122] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=12315,uid=0 [ 2798.877267][ T1122] Memory cgroup out of memory: Killed process 12315 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35796kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2798.896484][ T1200] loop4: p2 < > [ 2798.918611][ T1200] loop4: partition table partially beyond EOD, truncated [ 2798.944183][ T1200] loop4: p2 size 2 extends beyond EOD, truncated 23:19:38 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d56385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46f8da259b7feb20332dfcf78f63db9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a99f64286324ac69e69e1b3b73cda5619ebe107b4cc95daa82b8650b023e185411dd2c5240cce2d9e63e6bc6f22b02b0fb79a133b54b8c95c92028217d217cfcb7f09f3f13d00001a6a9a263c37ba6183f40c705a188833b8bedcbfda84810c2fe6808aeacc1808bd087f62004154d52b23ff90197e3628"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:38 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:38 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000010500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:38 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000006400000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:38 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:38 executing program 2: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x80800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c06, 0xffffffffffffffff) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b110868917f97f2a3be27d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_dccp(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ppoll(&(0x7f00000018c0)=[{r3, 0x100}, {0xffffffffffffffff, 0x3000}, {r6, 0x4008}, {r7, 0x9150}, {r8, 0x1000}, {r12, 0x20}, {0xffffffffffffffff, 0x8008}], 0x7, &(0x7f0000001900)={0x77359400}, &(0x7f0000001940)={[0x7]}, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0xfffffffc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2799.319731][ T1232] loop4: p2 < > [ 2799.323596][ T1232] loop4: partition table partially beyond EOD, truncated 23:19:38 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2799.363115][ T1232] loop4: p2 size 2 extends beyond EOD, truncated [ 2799.423718][ T1214] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:39 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0d000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000ffffffee00000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x29, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:39 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2799.498911][ T1214] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2799.526734][ T1214] loop5: p2 < > 23:19:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xff00, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:39 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:39 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000020500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:39 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0e000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2799.882076][ T1268] Dev loop4: unable to read RDB block 1 [ 2799.893596][ T1268] loop4: unable to read partition table [ 2799.944222][ T1268] loop4: partition table beyond EOD, truncated [ 2799.995060][ T1268] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 23:19:39 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:39 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f0f000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:39 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000001fc00000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2800.297030][ T1280] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2800.329904][ T1280] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2800.354464][ T1280] loop5: p2 < > 23:19:39 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:40 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000030500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:40 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2800.930415][ T1308] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2800.977055][ T1308] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2800.988186][ T1291] loop4: p2 < > [ 2800.991964][ T1291] loop4: partition table partially beyond EOD, truncated [ 2801.054745][ T1308] loop5: p2 < > [ 2801.058657][ T1291] loop4: p2 size 2 extends beyond EOD, truncated 23:19:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x2b, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:41 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f10000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:41 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:41 executing program 2: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00f5ffffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:41 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000002004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:41 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000040500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:41 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:41 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2801.735076][ T1336] ldm_validate_privheads(): Disk read failed. [ 2801.794946][ T1336] loop4: p2 < > [ 2801.800126][ T1336] loop4: partition table partially beyond EOD, truncated [ 2801.816256][ T1336] loop4: p2 size 2 extends beyond EOD, truncated 23:19:41 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:41 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000003004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:41 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f11000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2802.124793][ T1338] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2802.216656][ T1337] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2802.243292][ T1337] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2802.252637][ T1338] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:41 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2802.296737][ T1337] loop2: p2 < > [ 2802.303866][ T1338] loop5: p2 < > [ 2802.439459][ T1366] ldm_validate_privheads(): Disk read failed. [ 2802.500993][ T1366] loop4: p2 < > [ 2802.560470][ T1366] loop4: partition table partially beyond EOD, truncated [ 2802.637149][ T1366] loop4: p2 size 2 extends beyond EOD, truncated 23:19:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x2c, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:42 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000050500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:42 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:42 executing program 2: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00f5ffffff000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:42 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000004004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:42 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f12000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:42 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:42 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2803.200792][ T1401] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2803.241526][ T1389] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2803.275421][ T1401] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2803.293336][ T1411] ldm_validate_privheads(): Disk read failed. [ 2803.297096][ T1389] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2803.306943][ T1411] loop4: p2 < > [ 2803.311399][ T1411] loop4: partition table partially beyond EOD, truncated [ 2803.313799][ T1389] loop5: p2 < > [ 2803.322793][ T1401] loop2: p2 < > 23:19:42 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:42 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f13000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2803.365738][ T1411] loop4: p2 size 2 extends beyond EOD, truncated 23:19:42 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0xfffffffa) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f00000002c0)=""/178, 0xb2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x501080, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000380)="a32a21e2ba8e9cd9074be53f1a8bbf30a121e4763dbc3ab0412bdc2879bcad01c576e451e0f989d20dee5d2f90abe486f0b40e1ed6ae82e0ee673b9d745cc7ec17ebd004a9eb139670d8e0c6ccbf194e58e6f9f98da84ba11022ac5fc3e23778223067ea4ffa1370ab6f8154f8c3fa01291c4788bb60367b91812da75eae6b9e6b77f20f43873f3fbb6eb1b63f474d5ccaaee34f9d5910634a33f8c741dcd942f9", &(0x7f00000004c0)="902ec742f56d182a4af5c40b8fea1c3b24fb95589b667c5c56f874b28c7f75340df8e4cd3880c4239c0dfb031b2675a5a4ba3f622c00e67dd639cba440884a8c009b94ab1a04e6774719eefa5a81cb2aaafbffbba1dc5ee556"}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000}, 0x1c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) getrandom(&(0x7f0000000580)=""/4096, 0x1000, 0x1) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) getgid() fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x0) 23:19:43 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000005004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x2f, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:43 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:43 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000060500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:43 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f14000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2803.907140][ T1440] ldm_validate_privheads(): Disk read failed. [ 2803.927530][ T1440] loop4: p2 < > [ 2803.955021][ T1440] loop4: partition table partially beyond EOD, truncated [ 2803.962909][ T1440] loop4: p2 size 2 extends beyond EOD, truncated 23:19:43 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:43 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031f15000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:43 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000006004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:43 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0xfffffffa) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f00000002c0)=""/178, 0xb2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x501080, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000380)="a32a21e2ba8e9cd9074be53f1a8bbf30a121e4763dbc3ab0412bdc2879bcad01c576e451e0f989d20dee5d2f90abe486f0b40e1ed6ae82e0ee673b9d745cc7ec17ebd004a9eb139670d8e0c6ccbf194e58e6f9f98da84ba11022ac5fc3e23778223067ea4ffa1370ab6f8154f8c3fa01291c4788bb60367b91812da75eae6b9e6b77f20f43873f3fbb6eb1b63f474d5ccaaee34f9d5910634a33f8c741dcd942f9", &(0x7f00000004c0)="902ec742f56d182a4af5c40b8fea1c3b24fb95589b667c5c56f874b28c7f75340df8e4cd3880c4239c0dfb031b2675a5a4ba3f622c00e67dd639cba440884a8c009b94ab1a04e6774719eefa5a81cb2aaafbffbba1dc5ee556"}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000}, 0x1c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) getrandom(&(0x7f0000000580)=""/4096, 0x1000, 0x1) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) getgid() fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x0) [ 2804.254310][ T1444] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2804.317380][ T1444] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2804.348300][ T1444] loop5: p2 < > 23:19:43 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:43 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000001f000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2804.398777][ T1469] ldm_validate_privheads(): Disk read failed. [ 2804.470770][ T1469] loop4: p2 < > [ 2804.474367][ T1469] loop4: partition table partially beyond EOD, truncated 23:19:44 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2804.597601][ T1469] loop4: p2 size 2 extends beyond EOD, truncated 23:19:44 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000020000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3a, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:44 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x141, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200080c4}, 0x4014) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x40, r1, 0x0, 0x70bd25, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) tkill(r0, 0x9) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000001c0)={0x0, 0x0, 0x7, 0x0, @scatter={0x0, 0x2, &(0x7f0000000180)}, &(0x7f0000000240)="dd550241516a79", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0xc070d3f500000000}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000000)=0x54) 23:19:44 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000070500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:44 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000007004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:44 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:44 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2805.100746][ T1511] ldm_validate_privheads(): Disk read failed. [ 2805.140775][ T1511] loop4: p2 < > [ 2805.161105][ T1511] loop4: partition table partially beyond EOD, truncated [ 2805.216584][ T1511] loop4: p2 size 2 extends beyond EOD, truncated [ 2805.242463][ T1509] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2805.280721][ T1509] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2805.322249][ T1509] loop5: p2 < > 23:19:44 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000004000000000000"]) socket$inet(0x2, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 23:19:44 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000023000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:44 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000008004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:45 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:45 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000080500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3c, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2805.769093][ T1538] ldm_validate_privheads(): Disk read failed. [ 2805.784333][ T1538] loop4: p2 < > [ 2805.790853][ T1538] loop4: partition table partially beyond EOD, truncated 23:19:45 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0xfffffffa) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x6}, 0x0, 0x0, 0x3, 0x8, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f00000002c0)=""/178, 0xb2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x501080, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000380)="a32a21e2ba8e9cd9074be53f1a8bbf30a121e4763dbc3ab0412bdc2879bcad01c576e451e0f989d20dee5d2f90abe486f0b40e1ed6ae82e0ee673b9d745cc7ec17ebd004a9eb139670d8e0c6ccbf194e58e6f9f98da84ba11022ac5fc3e23778223067ea4ffa1370ab6f8154f8c3fa01291c4788bb60367b91812da75eae6b9e6b77f20f43873f3fbb6eb1b63f474d5ccaaee34f9d5910634a33f8c741dcd942f9", &(0x7f00000004c0)="902ec742f56d182a4af5c40b8fea1c3b24fb95589b667c5c56f874b28c7f75340df8e4cd3880c4239c0dfb031b2675a5a4ba3f622c00e67dd639cba440884a8c009b94ab1a04e6774719eefa5a81cb2aaafbffbba1dc5ee556"}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000}, 0x1c) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) getrandom(&(0x7f0000000580)=""/4096, 0x1000, 0x1) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) getgid() fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 2805.842927][ T1538] loop4: p2 size 2 extends beyond EOD, truncated 23:19:45 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000009004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:45 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000028000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:45 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2806.302185][ T1570] ldm_validate_privheads(): Disk read failed. [ 2806.317681][ T1558] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2806.340664][ T1558] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2806.347769][ T1570] loop4: p2 < > [ 2806.395685][ T1570] loop4: partition table partially beyond EOD, truncated [ 2806.428544][ T1558] loop5: p2 < > 23:19:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x2, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:45 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2806.445290][ T1570] loop4: p2 size 2 extends beyond EOD, truncated 23:19:46 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000003f000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sched\x00') 23:19:46 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000a004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:46 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:46 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000090500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:46 executing program 2: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000004"]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000000c0)) [ 2806.914495][ T1597] ldm_validate_privheads(): Disk read failed. 23:19:46 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2806.980831][ T1597] loop4: p2 < > [ 2807.022035][ T1597] loop4: partition table partially beyond EOD, truncated [ 2807.115342][ T1597] loop4: p2 size 2 extends beyond EOD, truncated 23:19:46 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000040000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:46 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000000c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:46 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2807.205614][ T1613] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2807.230108][ T1613] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2807.290841][ T1613] loop5: p2 < > [ 2807.431647][ T1630] print_req_error: 1 callbacks suppressed [ 2807.431665][ T1630] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2807.465356][ T1613] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 2807.540656][ T1639] ldm_validate_privheads(): Disk read failed. [ 2807.547190][ T1639] loop4: p2 < > 23:19:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x4, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:47 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r1], 0x2}}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000d501040000faffffff000000dcec6c68000034be9284aaa5b5db0700000068000a0500b71feb1a"], 0x2b) readv(r2, &(0x7f0000000480)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x2}}, 0x18) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000a80)=""/152) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 23:19:47 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2807.587901][ T2630] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.598964][ T2630] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.607551][ T2630] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.618626][ T2630] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.630911][ T1639] loop4: partition table partially beyond EOD, truncated 23:19:47 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000be5a941000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2807.690646][ T1639] loop4: p2 size 2 extends beyond EOD, truncated [ 2807.720839][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.732000][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.740330][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.751453][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.759711][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.770802][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.779008][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.789919][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.798781][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.809712][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.818679][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.830159][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.838371][ T2629] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2807.849374][ T2629] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 2807.858511][ T2630] Buffer I/O error on dev loop5p2, logical block 0, async page read 23:19:47 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000a0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:47 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:47 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000048000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2808.036926][ T1660] mmap: syz-executor.2 (1660) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 23:19:47 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000023004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2808.199780][ T1665] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:47 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2808.244134][ T1665] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2808.256539][ T1665] loop5: p2 < > [ 2808.372291][ T1678] ldm_validate_privheads(): Disk read failed. [ 2808.380828][ T1678] loop4: p2 < > [ 2808.384509][ T1678] loop4: partition table partially beyond EOD, truncated [ 2808.413231][ T1678] loop4: p2 size 2 extends beyond EOD, truncated 23:19:48 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000004c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:48 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000048004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x6, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2808.841673][ T1699] ldm_validate_privheads(): Disk read failed. [ 2808.861073][ T1699] loop4: p2 < > [ 2808.892380][ T1699] loop4: partition table partially beyond EOD, truncated [ 2808.900837][ T1699] loop4: p2 size 2 extends beyond EOD, truncated 23:19:48 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR, @ANYRES32=r0], @ANYBLOB="0000000000000000000000000900010068000000180002001400010000000000", @ANYBLOB="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", @ANYBLOB="0000b20000000000"], 0x5}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000d501040000faffffff000000dcec6c68000034be9284aaa5b5db0700000068000a0500b71feb1a"], 0x2b) readv(r3, &(0x7f0000000480)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1) r4 = dup3(r3, r1, 0x80000) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x2}}, 0x18) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000a80)=""/152) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0xec040000, 0x10000000002) 23:19:48 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000b0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:48 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:48 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000060000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000004c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:48 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2809.361269][ T1721] ldm_validate_privheads(): Disk read failed. [ 2809.367928][ T1721] loop4: p2 < > [ 2809.397071][ T1721] loop4: partition table partially beyond EOD, truncated [ 2809.421169][ T1730] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2809.460850][ T1721] loop4: p2 size 2 extends beyond EOD, truncated 23:19:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x29, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2809.482256][ T1730] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:49 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000166000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2809.597733][ T1730] loop5: p2 < > 23:19:49 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:49 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000060004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:49 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:49 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000c0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2810.021909][ T1757] ldm_validate_privheads(): Disk read failed. [ 2810.042723][ T1757] loop4: p2 < > [ 2810.081062][ T1757] loop4: partition table partially beyond EOD, truncated [ 2810.132373][ T1757] loop4: p2 size 2 extends beyond EOD, truncated [ 2810.356931][ T1764] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2810.430497][ T1764] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2810.452643][ T1764] loop5: p2 < > 23:19:50 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR, @ANYRES32=r0], @ANYBLOB="0000000000000000000000000900010068000000180002001400010000000000", @ANYBLOB="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", @ANYBLOB="0000b20000000000"], 0x5}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000d501040000faffffff000000dcec6c68000034be9284aaa5b5db0700000068000a0500b71feb1a"], 0x2b) readv(r3, &(0x7f0000000480)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1) r4 = dup3(r3, r1, 0x80000) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x2}}, 0x18) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000a80)=""/152) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) mlockall(0x5) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0xec040000, 0x10000000002) 23:19:50 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000068000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:50 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000068004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x2b, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:50 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000d0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2811.160506][ T1789] ldm_validate_privheads(): Disk read failed. [ 2811.214629][ T1789] loop4: p2 < > [ 2811.218321][ T1789] loop4: partition table partially beyond EOD, truncated [ 2811.234293][ T1789] loop4: p2 size 2 extends beyond EOD, truncated 23:19:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:50 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000006c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2811.389263][ T1787] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2811.400837][ T1787] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:50 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2811.451222][ T1787] loop5: p2 < > 23:19:50 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000006c004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:51 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2811.871799][ T1820] ldm_validate_privheads(): Disk read failed. [ 2811.890956][ T1820] loop4: p2 < > [ 2811.980608][ T1820] loop4: partition table partially beyond EOD, truncated [ 2812.038241][ T1820] loop4: p2 size 2 extends beyond EOD, truncated 23:19:52 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000e0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 2: open(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000001000/0x3000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@dev}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@dev}, 0x14) 23:19:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000016e000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x2c, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:52 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000074004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2ed"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2812.781353][ T1849] ldm_validate_privheads(): Disk read failed. [ 2812.816874][ T1849] loop4: p2 < > [ 2812.837142][ T1849] loop4: partition table partially beyond EOD, truncated [ 2812.845189][ T1849] loop4: p2 size 2 extends beyond EOD, truncated [ 2812.914525][ T1843] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2812.940771][ T1843] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000074000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2ed"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:52 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x1132}) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000000)) dup3(r0, r1, 0x0) [ 2813.032479][ T1843] loop5: p2 < > 23:19:52 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000000000000000050000007a004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2ed"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2813.301278][ T1877] ldm_validate_privheads(): Disk read failed. [ 2813.310272][ T1877] loop4: p2 < > [ 2813.315632][ T1877] loop4: partition table partially beyond EOD, truncated 23:19:52 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000f0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x2f, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2813.351739][ T1877] loop4: p2 size 2 extends beyond EOD, truncated 23:19:52 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000007a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2813.461778][ T1877] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 2813.469957][ T1904] print_req_error: 1 callbacks suppressed [ 2813.469979][ T1904] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 23:19:52 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b966"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2813.550745][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.561842][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.585712][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 23:19:53 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000090004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2813.596654][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.605017][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.616143][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.625966][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.636947][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.645143][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.656088][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.664351][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.675276][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read 23:19:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="b80000000001190500000000ffffff97000000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c00010014000300fe88000000000000000000000000000114000400ff00000c00000000000000000000000108000700000000186be77d49bc8236da34730024000f00140c0002000500010000000000"], 0xb8}}, 0x0) [ 2813.696085][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.707305][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.716182][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.727127][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.735304][ T2630] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2813.746243][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.754470][ T2630] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 2813.760913][ T1913] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000580)=""/4096, 0x1000, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) [ 2813.819642][ T1923] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2813.851594][ T1913] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b966"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2813.871390][ T1913] loop5: p2 < > [ 2813.946255][ T1926] ldm_validate_privheads(): Disk read failed. [ 2813.991012][ T1926] loop4: p2 < > [ 2813.994857][ T1926] loop4: partition table partially beyond EOD, truncated [ 2814.048407][ T1926] loop4: p2 size 2 extends beyond EOD, truncated 23:19:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b966"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:53 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000004088000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:53 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000100500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:53 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000034200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:53 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000040000"]) socket$inet(0x2, 0x3, 0x0) r1 = open(0x0, 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) 23:19:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3a, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:53 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2814.446787][ T1958] ldm_validate_privheads(): Disk read failed. [ 2814.487615][ T1958] loop4: p2 < > [ 2814.510156][ T1959] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2814.560731][ T1958] loop4: partition table partially beyond EOD, truncated [ 2814.569193][ T1958] loop4: p2 size 2 extends beyond EOD, truncated 23:19:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r4 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x2120, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r4, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) r5 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x80000001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x201, 0x70bd26, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040000}, 0x40010) openat$cgroup_procs(r6, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r7 = openat$cgroup(r6, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000080), 0x4) 23:19:54 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:54 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000018a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2814.600968][ T1959] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2814.608282][ T1959] loop5: p2 < > 23:19:54 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000054200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2814.734711][ T27] audit: type=1804 audit(1581031194.173:97): pid=1984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir382542825/syzkaller.kOgaGr/2656/file0" dev="sda1" ino=16870 res=1 23:19:54 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:54 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000110500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2815.041777][ T1997] ldm_validate_privheads(): Disk read failed. [ 2815.094433][ T1997] loop4: p2 < > 23:19:54 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2815.147190][ T1997] loop4: partition table partially beyond EOD, truncated [ 2815.182937][ T1997] loop4: p2 size 2 extends beyond EOD, truncated 23:19:54 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffff8c000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3c, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:54 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000064200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2815.353129][ T2000] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2815.363889][ T2000] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2815.382172][ T2000] loop5: p2 < > 23:19:54 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r3, &(0x7f00000005c0)=ANY=[], 0xfffffcaa) r4 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x2120, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r4, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) fcntl$getownex(r2, 0x10, &(0x7f0000000140)) r5 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x80000001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x201, 0x70bd26, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040000}, 0x40010) openat$cgroup_procs(r6, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r7 = openat$cgroup(r6, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000080), 0x4) 23:19:55 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000028e000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2815.631256][ T2025] ldm_validate_privheads(): Disk read failed. [ 2815.637691][ T2025] loop4: p2 < > [ 2815.650572][ T2025] loop4: partition table partially beyond EOD, truncated [ 2815.687677][ T2025] loop4: p2 size 2 extends beyond EOD, truncated 23:19:55 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2815.791503][ T27] audit: type=1804 audit(1581031195.233:98): pid=2031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir382542825/syzkaller.kOgaGr/2657/file0" dev="sda1" ino=16880 res=1 23:19:55 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000074200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:55 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000120500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:55 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:55 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffff97000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x2}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2816.131205][ T2051] ldm_validate_privheads(): Disk read failed. [ 2816.137699][ T2051] loop4: p2 < > [ 2816.149419][ T2051] loop4: partition table partially beyond EOD, truncated [ 2816.157435][ T2051] loop4: p2 size 2 extends beyond EOD, truncated 23:19:55 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2816.221003][ T2057] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2816.259410][ T2057] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:55 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000094200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2816.330735][ T2057] loop5: p2 < > 23:19:55 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:56 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000130500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2816.681217][ T2078] ldm_validate_privheads(): Disk read failed. [ 2816.687604][ T2078] loop4: p2 < > [ 2816.755037][ T2078] loop4: partition table partially beyond EOD, truncated [ 2816.831095][ T2078] loop4: p2 size 2 extends beyond EOD, truncated 23:19:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x8008450a, 0x0) 23:19:56 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f000000019a000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:56 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000000a4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x3}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2817.083497][ T2085] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:56 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2817.147086][ T2085] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2817.233967][ T2085] loop5: p2 < > [ 2817.275232][ T2110] ldm_validate_privheads(): Disk read failed. [ 2817.281981][ T2110] loop4: p2 < > [ 2817.285777][ T2110] loop4: partition table partially beyond EOD, truncated [ 2817.293468][ T2110] loop4: p2 size 2 extends beyond EOD, truncated 23:19:56 executing program 2: connect$inet6(0xffffffffffffffff, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0xfffffffa) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f00000002c0)=""/178, 0xb2, 0x2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x501080, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000580)=""/4096, 0x1000, 0x1) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) socket$inet(0x2, 0x4000000000000001, 0x0) 23:19:56 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000b6000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:56 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000000c4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:57 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000140500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:57 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x52, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000004"]) prctl$PR_SET_UNALIGN(0x6, 0x0) 23:19:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e21, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2817.801321][ T2135] ldm_validate_privheads(): Disk read failed. [ 2817.816812][ T2135] loop4: p2 < > [ 2817.835763][ T2135] loop4: partition table partially beyond EOD, truncated 23:19:57 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000be000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2817.897379][ T2135] loop4: p2 size 2 extends beyond EOD, truncated 23:19:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2817.996460][ T2138] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2818.032649][ T2138] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 23:19:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2818.076058][ T2138] loop5: p2 < > 23:19:57 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000e9104200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:57 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKMODE={0x5}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x38}}, 0x0) 23:19:57 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000150500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2818.331383][ T2167] ldm_validate_privheads(): Disk read failed. [ 2818.343116][ T2167] loop4: p2 < > [ 2818.360867][ T2167] loop4: partition table partially beyond EOD, truncated [ 2818.427168][ T2167] loop4: p2 size 2 extends beyond EOD, truncated 23:19:58 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000001c2000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2818.552178][ T2168] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:19:58 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000001f4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2818.665813][ T2168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2818.675349][ T2182] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2818.675364][ T2182] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2818.675697][ T2182] loop5: p2 < > [ 2818.731935][ T2168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:58 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000160500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:58 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000001c4000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2818.956517][ T2192] ldm_validate_privheads(): Disk read failed. 23:19:58 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2819.026051][ T2192] loop4: p2 < > [ 2819.029634][ T2192] loop4: partition table partially beyond EOD, truncated 23:19:58 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:58 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKMODE={0x5}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}]}, 0x38}}, 0x0) [ 2819.130966][ T2192] loop4: p2 size 2 extends beyond EOD, truncated [ 2819.214337][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2819.233881][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2819.250749][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2819.425424][ T2204] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x2}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:58 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000204200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:58 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffffc9000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:58 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x8001, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:58 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x101) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x0, &(0x7f0000000000)) [ 2819.506353][ T2204] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2819.576260][ T2204] loop5: p2 < > 23:19:59 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0}, 0x0) [ 2819.671010][ T2226] ldm_validate_privheads(): Disk read failed. [ 2819.705554][ T2226] loop4: p2 < > [ 2819.730506][ T2226] loop4: partition table partially beyond EOD, truncated [ 2819.771037][ T2226] loop4: p2 size 2 extends beyond EOD, truncated 23:19:59 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000170500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:59 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:59 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000234200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:19:59 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3a0c1, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./bus/file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000200ffffe5bf"], 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x6}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xa2b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 23:19:59 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000001e4000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2820.231109][ T2264] ldm_validate_privheads(): Disk read failed. [ 2820.237700][ T2264] loop4: p2 < > [ 2820.267270][ T2264] loop4: partition table partially beyond EOD, truncated 23:19:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x3}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:19:59 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:19:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400cd4dd607efd3fc00000000000000", @ANYRES32=r1, @ANYBLOB="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"], 0x170}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 2820.282351][ T2264] loop4: p2 size 2 extends beyond EOD, truncated 23:19:59 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4, 0x4}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2820.354968][ T2252] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:19:59 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000003f4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2820.440983][ T2252] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2820.465345][ T2252] loop5: p2 < > [ 2820.544433][ T2281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:20:00 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffffe4000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:00 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2820.589836][ T2281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:20:00 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000180500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2820.751110][ T2288] ldm_validate_privheads(): Disk read failed. [ 2820.757689][ T2288] loop4: p2 < > 23:20:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="700100002400cd4dd607efd3fc00000000000000", @ANYRES32=r1, @ANYBLOB="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"], 0x170}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 2820.810771][ T2288] loop4: partition table partially beyond EOD, truncated [ 2820.838101][ T2288] loop4: p2 size 2 extends beyond EOD, truncated 23:20:00 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000003e6000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:00 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:00 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}}, {0xa, 0x4e23, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2821.094486][ T2302] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2821.111860][ T2313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 23:20:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x4}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:20:00 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000404200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2821.190827][ T2302] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2821.220684][ T2302] loop5: p2 < > [ 2821.237222][ T2313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2821.341265][ T2320] ldm_validate_privheads(): Disk read failed. [ 2821.347741][ T2320] loop4: p2 < > [ 2821.380448][ T2320] loop4: partition table partially beyond EOD, truncated 23:20:00 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x0, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2821.387982][ T2320] loop4: p2 size 2 extends beyond EOD, truncated 23:20:00 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000190500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x40084504, 0x0) 23:20:00 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x0, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:00 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000484200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:01 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000010e9000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2821.694006][ T2345] ldm_validate_privheads(): Disk read failed. [ 2821.707970][ T2345] loop4: p2 < > [ 2821.725242][ T2345] loop4: partition table partially beyond EOD, truncated 23:20:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x0, 0xfffffff3, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2821.750741][ T2345] loop4: p2 size 2 extends beyond EOD, truncated 23:20:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a708628a146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)={[{@resgid={'resgid'}}]}) [ 2821.791731][ T2336] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2821.824046][ T2336] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2821.842923][ T2336] loop5: p2 < > 23:20:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0xc6c}, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x5}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) 23:20:01 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000004c4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2822.012495][ T2361] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 23:20:01 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000003ec000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:01 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000001a0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2822.092502][ T2361] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities 23:20:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc38e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xbb9e11a213a4ed5c, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket(0x2000000000000010, 0x1000040000000003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x140010, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000340)=""/220, 0x0) getpid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000200)="99245b2e6972731d959a35fdda251e35ceb8ee43918959f7dd7b24d017bea99bcdbbb8a6b67464cb73e2a641e8ca5f85c082b2f3692082a4a4ef49fe789ca3ca92403dc6143c6246066422fc8d18fe2d0a90e12cd6c49af49d10783a6e1a45bd59c6c6", 0x30837c0d}], 0x1, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r5) dup(0xffffffffffffffff) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8b19, &(0x7f00000002c0)='wlan1\x00\x0e\xd3UM\xe1\x04\xbeK\x19\xec\x02\x00\x03\x00\x00\xff\x00\x00\x00\x02\x01\xe5\xe8\",\x91\x91\x13\x9f\x19\x9e\x02\x00?\x00\xff\x8d\x00\x00\xf6\x00\xd4\xf2\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\xa4]\xbb\x10F\xe4\xa8\xa8\x00\x00\x00\x00\xdfA\x83\xcdx\x90\x9a\x82\xc0)(4\xdf\bL\x7f\xff\xff\xffs\x18Z\xcc\x026\xf4\xb0\x9b@:HX\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\x12\x19Z\xb3@o\xc7\xce\xec\x02:I\xf6\xcam\xbc (\x02z\x8eni)\xb5i\x0f\xc7\v\x9dz\xfa\x88\x87\xa2\xa8\xd9\x95:E\xfeO\xe7\xf8EX\xe3\xbcf\x02\x98P\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh.\xa3\xd7G0\x86C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7\x03\x9c\x9a\x1a\xde\b\xcaot\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa`\x93d\xff9\xfa\r\xbe\x16\xef\xf0\xfeThQ\xb8\xe8\xba7\xd0\xab.\x13L8V\x1d\xa0\x02y\xe4\x00\x8b\xcd\x1b\xe8#\xb4\xea@\x1b\xd0y\x02iE\xb30\xe8\xdb\xb1\xdb/e\xb3X\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyQOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39#\x9a\xcd\xe0\xd8q\x9a\xcd\xdeAF,\x04\"\x84)O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\x810\x12\xcc@\x89\xf8F\x82\x88O\x03\xeb\xad\xc7\xee\x17\x1f\xaaX\xeeO\xb5\xcf\xff@\xc09[\xec>\xf1_\xfd\xeb\x1e\x83\xbb\xd7\xdb\xf8\x94\x9d\xdf\xcc\xd8F\x005\x03\x00\x00\x00\x00\x00\x00\x00\x97\x87}\x8e\x03\x8b\xbbU_\xa4\tG\xbdZWQ\xf2\x91\xcb\xbf\x06\x93N\xf61\x9ea\xc3\xfd\xca\x9e`[\xd4\xb2\xe1\xa2\xc6h\xf8\x0f\xbaDP\x91\x13H\n\xe5F*\xe8\an\xeb\x18\x80A\xfe\xc3\xb4pJ;\xaa\x84*_k\xea\x87x\xda\xe8\xf5+\x89\xdc\x19|:,\xb7b\xc9\x10\x8a\xbe\xc3\x15)\x80\xd0t`7\xed\xe4&\xe25\x98vW\xf1\xdcL=\xf7\xa9\x9b\xe6\x03W^t\'*b\x98:\x8aU\xe0\x99!E\x87@*C\x97|?\xff7\xca\xfc\xaa<\xc8L\xbf/9\x1df\x8c\xa6\x8f3\xcc@g\x80)\xf4\v\xcd\x98[Y\x04\xb6b\xff\x86\xdb\x7f\xb9\x10\xd9\x18j\x1d\x16p\xc3\x02\'\x8eY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\xd8s\x1a\xc8\xf0z\xfc\xf6\xba*\xfar\xef\x98\xad\xaf\xb6r\xff\xfc\xcf\xebo\x8c\x05\x00\x00\x00\x00\x00\x00\x00\xca\x83\x88L\xf6\xa7\xf4|,\xdb\x85y\xfc\xad\xc6\xa0\x8aK\xb40\xfb\xc5\x85%\xc0\xa7\x81\xb5\xef\x9eehQ!\xe7\x0f\x96Ksx\xfc\x93\x84w\xae\xe9\x9f\xb2\v\x97n\x17\x9b,\xe5\xd8\xa4\x9c\x8f\xba\x8a_$\x95\xf1<\xe4zv\x83\xb2\xba\xe4\x96\xeb0gl\x1f\a\x9a#D\xaa\xa6\x0e6\xf6H\xc7\x8f\xdanwB\x97\xb6_\xcb\xd8L\x9d\xf5\xf8\xf3xvs\xc3\xf2\xf8\xe4!\xe7\x92\a6Q]r\x16\xa9O\x888\fm\xe7q\xc8\xc3\x90\xae\x8d\xc4e~\x9e\xdc\xae\x00;\\6\xa9\"\xed\xfd\x95=Ge\xb5\xdd\xcf\xe8\x1b\f`\xf8\x83\xc5\xb0n\xa1\xfbRd\xee0\xdd\xe1\xe5\x06c\xe5\xc1!\xf5\xbb\xf21\xfd\x19&\x16\x85N\xf3\x9a\xbb\xf6\xc7\xc5\x10\xf5\xe1\x80\xa4w3Fd\xc0\xaa\x1b3\xc4\v7\xb1') r8 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_buf(r8, 0x1, 0x37, 0x0, &(0x7f0000000100)) r9 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_buf(r9, 0x1, 0x37, 0x0, &(0x7f0000000100)) r10 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_buf(r10, 0x1, 0x37, 0x0, &(0x7f0000000100)) write$FUSE_DIRENT(r7, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r9, @ANYBLOB="2733c3037014d28ff75704506d0102000000000000f319dc89522743060ea91ca33c8bffa0a822e4311fc1b00383c86141818f880100000400000018687cb7080513bbba074e7c2be4b01638676a2c28d6fa7a041567b97c4695eca5bda07e3ed73ea619f45e9b9381419250a95f971421783490631baabadbf92cd74d54c5e69b09b7020b73b563e822e5e8c83290eb742186ab71264d9081efd267ea6b19b6f426b77241bf52a6fb64e1ff733edfb116ed8b5870b6a7554f223a7be51cc02cd634", @ANYRESDEC=r7, @ANYRESOCT=r10, @ANYRES32], 0x103) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000300)={0x0, 0x0, r3}) fcntl$setpipe(r3, 0x407, 0x0) r11 = creat(0x0, 0x1b) getresuid(&(0x7f0000000240), 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r11, 0xc0286405, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:20:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2822.197693][ T2369] ldm_validate_privheads(): Disk read failed. [ 2822.232897][ T2369] loop4: p2 < > [ 2822.260432][ T2369] loop4: partition table partially beyond EOD, truncated [ 2822.277424][ T2369] loop4: p2 size 2 extends beyond EOD, truncated 23:20:01 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00ffffffee000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:01 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000604200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2822.549806][ T2382] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 2822.581496][ T2382] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2822.613679][ T2382] loop5: p2 < > 23:20:02 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2822.716686][ T2403] ldm_validate_privheads(): Disk read failed. [ 2822.728601][ T2403] loop4: p2 < > 23:20:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x6}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2822.763698][ T2403] loop4: partition table partially beyond EOD, truncated [ 2822.830289][ T2403] loop4: p2 size 2 extends beyond EOD, truncated 23:20:02 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fffffff5000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:02 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x0, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:02 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000000000000000000500000000684200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:02 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x0, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:02 executing program 5: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000001b0500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) tkill(0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 23:20:02 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00fffffff6000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:02 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x0, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5, 0x9]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2823.319521][ T2434] ldm_validate_privheads(): Disk read failed. [ 2823.346738][ T2434] loop4: p2 < > 23:20:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x6, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3, 0x5}, @timestamp={0x4, 0x11}]}}, {"e483cff3a0e0a0bea766cc0f02d9c821"}}}}}, 0x52) [ 2823.392672][ T2434] loop4: partition table partially beyond EOD, truncated [ 2823.456838][ T2434] loop4: p2 size 2 extends beyond EOD, truncated 23:20:02 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:20:03 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000407f8000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) pipe2(0x0, 0x80000) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x4000) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000002c0)=@ccm_128={{0x303}, "ebed5c2d30202c44", "2c926abf206a8537708d4ea3faaaff1a", "2e8f5c42", "8897033638af900b"}, 0x28) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) semctl$SETVAL(0x0, 0x1, 0x10, &(0x7f0000000100)) sched_getattr(0x0, &(0x7f0000000300)={0x38}, 0x38, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) socket(0x10, 0x3, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) 23:20:03 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f00000000000000000005000000006c4200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 23:20:03 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2823.736767][ T2447] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 23:20:03 executing program 3: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f0000015241d9928a4672b0c20b3acaebcf3e6df10de3e41b317636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46fb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}, 0x4}, {0xa, 0x4e23, 0x0, @ipv4, 0x7}, 0x5, [0x3ff, 0x2ec, 0x6, 0x69b, 0x7b2, 0x9, 0xe5]}, 0x5c) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 2823.794633][ T2447] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 2823.822942][ T2447] loop5: p2 < > [ 2823.856659][ T2473] ldm_validate_privheads(): Disk read failed. [ 2823.914003][ T2473] loop4: p2 < > [ 2823.917795][ T2473] loop4: partition table partially beyond EOD, truncated [ 2823.926091][ T2473] loop4: p2 size 2 extends beyond EOD, truncated 23:20:03 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10400, 0x0) syz_read_part_table(0x41a9e50b, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005090000000e001400000000000000000f0000031efa000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 2824.105682][ T2481] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2824.117597][ T2481] CPU: 0 PID: 2481 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2824.127050][ T2481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2824.137105][ T2481] Call Trace: [ 2824.140401][ T2481] dump_stack+0x197/0x210 [ 2824.144744][ T2481] dump_header+0x177/0x1152 [ 2824.149270][ T2481] ? pagefault_out_of_memory+0x11c/0x11c [ 2824.154905][ T2481] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2824.160712][ T2481] ? ___ratelimit+0x60/0x595 [ 2824.165303][ T2481] ? do_raw_spin_unlock+0x181/0x270 [ 2824.170509][ T2481] oom_kill_process.cold+0x10/0x15 [ 2824.175629][ T2481] out_of_memory+0x334/0x13c0 [ 2824.180312][ T2481] ? __this_cpu_preempt_check+0x35/0x190 [ 2824.185954][ T2481] ? retint_kernel+0x2b/0x2b [ 2824.190561][ T2481] ? oom_killer_disable+0x280/0x280 [ 2824.195797][ T2481] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2824.201351][ T2481] ? memcg_oom_wake_function+0x700/0x700 [ 2824.207015][ T2481] ? do_raw_spin_unlock+0x181/0x270 [ 2824.212225][ T2481] ? _raw_spin_unlock+0x28/0x40 [ 2824.217090][ T2481] try_charge+0xeb1/0x13e0 [ 2824.221541][ T2481] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2824.227114][ T2481] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2824.232664][ T2481] ? mem_cgroup_css_offline+0x330/0x330 [ 2824.238225][ T2481] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2824.243949][ T2481] ? __vm_enough_memory+0x1b7/0x390 [ 2824.249159][ T2481] mem_cgroup_try_charge+0x136/0x590 [ 2824.254458][ T2481] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2824.260110][ T2481] shmem_getpage_gfp+0x863/0x29b0 [ 2824.265169][ T2481] ? shmem_unuse_inode+0x1100/0x1100 [ 2824.270456][ T2481] ? iov_iter_fault_in_readable+0x367/0x450 [ 2824.276355][ T2481] ? iov_iter_fault_in_readable+0x377/0x450 [ 2824.282255][ T2481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2824.288490][ T2481] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2824.294500][ T2481] shmem_write_begin+0x105/0x1e0 [ 2824.299447][ T2481] generic_perform_write+0x23b/0x540 [ 2824.304738][ T2481] ? timestamp_truncate+0x2f0/0x2f0 [ 2824.309961][ T2481] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2824.318032][ T2481] ? update_time+0xb0/0xb0 [ 2824.322460][ T2481] ? __kasan_check_write+0x14/0x20 [ 2824.327572][ T2481] ? down_write+0xdf/0x150 [ 2824.332125][ T2481] __generic_file_write_iter+0x25e/0x630 [ 2824.337770][ T2481] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2824.343499][ T2481] generic_file_write_iter+0x420/0x68e [ 2824.348973][ T2481] ? __generic_file_write_iter+0x630/0x630 [ 2824.354789][ T2481] ? retint_kernel+0x2b/0x2b [ 2824.359390][ T2481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2824.365696][ T2481] ? iov_iter_init+0xee/0x220 [ 2824.370404][ T2481] new_sync_write+0x4d3/0x770 [ 2824.375096][ T2481] ? new_sync_read+0x800/0x800 [ 2824.379882][ T2481] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2824.386054][ T2481] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2824.391368][ T2481] __vfs_write+0xe1/0x110 [ 2824.395710][ T2481] vfs_write+0x268/0x5d0 [ 2824.399971][ T2481] ksys_pwrite64+0x183/0x1c0 [ 2824.404565][ T2481] ? __ia32_sys_pread64+0xf0/0xf0 [ 2824.409591][ T2481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2824.415052][ T2481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2824.420514][ T2481] ? do_syscall_64+0x26/0x790 [ 2824.425196][ T2481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2824.431267][ T2481] ? do_syscall_64+0x26/0x790 [ 2824.435955][ T2481] __x64_sys_pwrite64+0x97/0xf0 [ 2824.440814][ T2481] do_syscall_64+0xfa/0x790 [ 2824.445323][ T2481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2824.451212][ T2481] RIP: 0033:0x415197 [ 2824.455100][ T2481] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2824.474693][ T2481] RSP: 002b:00007fda7d230a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2824.483094][ T2481] RAX: ffffffffffffffda RBX: 00007fda7d2316d4 RCX: 0000000000415197 [ 2824.491064][ T2481] RDX: 0000000008100000 RSI: 0000000020000680 RDI: 0000000000000008 [ 2824.499038][ T2481] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 2824.507003][ T2481] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 2824.514984][ T2481] R13: 0000000000000ba5 R14: 00000000004cc7cf R15: 000000000075bfd4 [ 2824.524101][ T2481] memory: usage 307200kB, limit 307200kB, failcnt 8083 [ 2824.531062][ T2481] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2824.538050][ T2481] Memory cgroup stats for /syz2: [ 2824.539521][ T2481] anon 250822656 [ 2824.539521][ T2481] file 704512 [ 2824.539521][ T2481] kernel_stack 8810496 [ 2824.539521][ T2481] slab 18354176 [ 2824.539521][ T2481] sock 147456 [ 2824.539521][ T2481] shmem 692224 [ 2824.539521][ T2481] file_mapped 135168 [ 2824.539521][ T2481] file_dirty 0 [ 2824.539521][ T2481] file_writeback 0 [ 2824.539521][ T2481] anon_thp 216006656 [ 2824.539521][ T2481] inactive_anon 675840 [ 2824.539521][ T2481] active_anon 250851328 [ 2824.539521][ T2481] inactive_file 65536 [ 2824.539521][ T2481] active_file 28672 [ 2824.539521][ T2481] unevictable 0 [ 2824.539521][ T2481] slab_reclaimable 3108864 [ 2824.539521][ T2481] slab_unreclaimable 15245312 [ 2824.539521][ T2481] pgfault 203313 [ 2824.539521][ T2481] pgmajfault 0 [ 2824.539521][ T2481] workingset_refault 33 [ 2824.539521][ T2481] workingset_activate 0 [ 2824.539521][ T2481] workingset_nodereclaim 0 [ 2824.539521][ T2481] pgrefill 26600 [ 2824.539521][ T2481] pgscan 26210 [ 2824.539521][ T2481] pgsteal 258 [ 2824.635741][ T2481] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=1229,uid=0 [ 2824.652679][ T2481] Memory cgroup out of memory: Killed process 1229 (syz-executor.2) total-vm:72856kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2824.696052][ T2481] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2824.707429][ T2481] CPU: 0 PID: 2481 Comm: syz-executor.2 Not tainted 5.5.0-next-20200206-syzkaller #0 [ 2824.716881][ T2481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2824.726937][ T2481] Call Trace: [ 2824.730239][ T2481] dump_stack+0x197/0x210 [ 2824.734590][ T2481] dump_header+0x177/0x1152 [ 2824.739105][ T2481] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2824.744912][ T2481] ? ___ratelimit+0x2c8/0x595 [ 2824.749590][ T2481] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2824.755396][ T2481] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2824.760695][ T2481] ? trace_hardirqs_on+0x67/0x240 [ 2824.765724][ T2481] ? pagefault_out_of_memory+0x11c/0x11c [ 2824.771361][ T2481] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 2824.777171][ T2481] ? ___ratelimit+0x60/0x595 [ 2824.781758][ T2481] ? do_raw_spin_unlock+0x181/0x270 [ 2824.786985][ T2481] oom_kill_process.cold+0x10/0x15 [ 2824.792126][ T2481] out_of_memory+0x334/0x13c0 [ 2824.796810][ T2481] ? find_held_lock+0x35/0x130 [ 2824.801589][ T2481] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2824.807407][ T2481] ? oom_killer_disable+0x280/0x280 [ 2824.812626][ T2481] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2824.818174][ T2481] ? memcg_oom_wake_function+0x700/0x700 [ 2824.823822][ T2481] ? do_raw_spin_unlock+0x181/0x270 [ 2824.829028][ T2481] ? _raw_spin_unlock+0x28/0x40 [ 2824.833896][ T2481] try_charge+0xeb1/0x13e0 [ 2824.838342][ T2481] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2824.843896][ T2481] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2824.849451][ T2481] ? mem_cgroup_css_offline+0x330/0x330 [ 2824.855009][ T2481] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2824.860729][ T2481] ? __vm_enough_memory+0x1b7/0x390 [ 2824.865946][ T2481] mem_cgroup_try_charge+0x136/0x590 [ 2824.871247][ T2481] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2824.876909][ T2481] shmem_getpage_gfp+0x863/0x29b0 [ 2824.881967][ T2481] ? shmem_unuse_inode+0x1100/0x1100 [ 2824.887253][ T2481] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2824.893494][ T2481] ? balance_dirty_pages_ratelimited+0x168/0x1e00 [ 2824.899913][ T2481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2824.906150][ T2481] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2824.912049][ T2481] shmem_write_begin+0x105/0x1e0 [ 2824.916988][ T2481] generic_perform_write+0x23b/0x540 [ 2824.922271][ T2481] ? timestamp_truncate+0x2f0/0x2f0 [ 2824.927482][ T2481] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2824.935552][ T2481] ? update_time+0xb0/0xb0 [ 2824.939975][ T2481] ? __kasan_check_write+0x14/0x20 [ 2824.945083][ T2481] ? down_write+0xdf/0x150 [ 2824.949506][ T2481] __generic_file_write_iter+0x25e/0x630 [ 2824.955136][ T2481] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2824.960867][ T2481] generic_file_write_iter+0x420/0x68e [ 2824.966333][ T2481] ? __generic_file_write_iter+0x630/0x630 [ 2824.972155][ T2481] ? retint_kernel+0x2b/0x2b [ 2824.976759][ T2481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2824.983009][ T2481] ? iov_iter_init+0xee/0x220 [ 2824.987701][ T2481] new_sync_write+0x4d3/0x770 [ 2824.992385][ T2481] ? new_sync_read+0x800/0x800 [ 2824.997170][ T2481] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2825.003332][ T2481] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2825.008631][ T2481] __vfs_write+0xe1/0x110 [ 2825.012968][ T2481] vfs_write+0x268/0x5d0 [ 2825.017217][ T2481] ksys_pwrite64+0x183/0x1c0 [ 2825.021806][ T2481] ? __ia32_sys_pread64+0xf0/0xf0 [ 2825.026832][ T2481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2825.032298][ T2481] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2825.037752][ T2481] ? do_syscall_64+0x26/0x790 [ 2825.042427][ T2481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2825.048492][ T2481] ? do_syscall_64+0x26/0x790 [ 2825.053183][ T2481] __x64_sys_pwrite64+0x97/0xf0 [ 2825.058038][ T2481] do_syscall_64+0xfa/0x790 [ 2825.062550][ T2481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2825.068439][ T2481] RIP: 0033:0x415197 [ 2825.072337][ T2481] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2825.091936][ T2481] RSP: 002b:00007fda7d230a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2825.100348][ T2481] RAX: ffffffffffffffda RBX: 00007fda7d2316d4 RCX: 0000000000415197 [ 2825.108316][ T2481] RDX: 0000000008100000 RSI: 0000000020000680 RDI: 0000000000000008 [ 2825.116282][ T2481] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 2825.124245][ T2481] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 2825.132210][ T2481] R13: 0000000000000ba5 R14: 00000000004cc7cf R15: 000000000075bfd4 [ 2825.140896][ T2481] memory: usage 307200kB, limit 307200kB, failcnt 8113 [ 2825.147763][ T2481] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2825.154639][ T2481] Memory cgroup stats for /syz2: [ 2825.154762][ T2481] anon 248582144 [ 2825.154762][ T2481] file 2867200 [ 2825.154762][ T2481] kernel_stack 8847360 [ 2825.154762][ T2481] slab 18354176 [ 2825.154762][ T2481] sock 147456 [ 2825.154762][ T2481] shmem 2854912 [ 2825.154762][ T2481] file_mapped 135168 [ 2825.154762][ T2481] file_dirty 0 [ 2825.154762][ T2481] file_writeback 0 [ 2825.154762][ T2481] anon_thp 213909504 [ 2825.154762][ T2481] inactive_anon 2973696 [ 2825.154762][ T2481] active_anon 248610816 [ 2825.154762][ T2481] inactive_file 65536 [ 2825.154762][ T2481] active_file 28672 [ 2825.154762][ T2481] unevictable 0 [ 2825.154762][ T2481] slab_reclaimable 3108864 [ 2825.154762][ T2481] slab_unreclaimable 15245312 [ 2825.154762][ T2481] pgfault 203643 [ 2825.154762][ T2481] pgmajfault 0 [ 2825.154762][ T2481] workingset_refault 33 [ 2825.154762][ T2481] workingset_activate 0 [ 2825.154762][ T2481] workingset_nodereclaim 0 [ 2825.154762][ T2481] pgrefill 26600 [ 2825.154762][ T2481] pgscan 26243 [ 2825.154762][ T2481] pgsteal 258 [ 2825.250424][ T2481] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7809,uid=0 [ 2825.266370][ T2481] Memory cgroup out of memory: Killed process 7809 (syz-executor.2) total-vm:72592kB, anon-rss:2200kB, file-rss:35812kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 2929.700345][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 2929.707462][ C0] (detected by 0, t=10502 jiffies, g=472173, q=76) [ 2929.714055][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10500 (4295230118-4295219618), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 2929.727398][ C0] syz-executor.2 R running task 26056 2481 9644 0x80004002 [ 2929.735290][ C0] Call Trace: [ 2929.738564][ C0] [ 2929.741420][ C0] sched_show_task.cold+0x2ee/0x35d [ 2929.746614][ C0] ? can_nice.part.0+0x20/0x20 [ 2929.751393][ C0] rcu_sched_clock_irq.cold+0xb23/0xc3d [ 2929.756952][ C0] update_process_times+0x2d/0x70 [ 2929.761973][ C0] tick_sched_handle+0xa2/0x190 [ 2929.766836][ C0] tick_sched_timer+0x53/0x140 [ 2929.771600][ C0] __hrtimer_run_queues+0x364/0xe40 [ 2929.776806][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 2929.782093][ C0] ? hrtimer_init+0x330/0x330 [ 2929.786762][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2929.792480][ C0] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 2929.798552][ C0] hrtimer_interrupt+0x314/0x770 [ 2929.803518][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 2929.809065][ C0] apic_timer_interrupt+0xf/0x20 [ 2929.813998][ C0] [ 2929.816928][ C0] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 2929.822725][ C0] Code: c0 88 b5 b3 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 42 eb c3 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 1a 61 f9 65 8b 05 28 54 12 78 85 c0 74 06 41 [ 2929.842319][ C0] RSP: 0018:ffffc900108a7360 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 2929.850722][ C0] RAX: 1ffffffff13676b1 RBX: ffffc900108a73d8 RCX: 0000000000000006 [ 2929.858691][ C0] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88804fdba95c [ 2929.866654][ C0] RBP: ffffc900108a7368 R08: 1ffffffff16a379d R09: fffffbfff16a379e [ 2929.874618][ C0] R10: fffffbfff16a379d R11: ffffffff8b51bcef R12: ffffffff89bd08c0 [ 2929.882584][ C0] R13: ffffc900108a7438 R14: ffff88809e76c520 R15: ffff88809e76d600 [ 2929.890652][ C0] css_task_iter_next+0x20a/0x2f0 [ 2929.895682][ C0] ? oom_badness.part.0+0x670/0x670 [ 2929.900879][ C0] mem_cgroup_scan_tasks+0xbe/0x180 [ 2929.906077][ C0] ? mem_cgroup_iter_break+0x30/0x30 [ 2929.911393][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2929.917643][ C0] ? task_will_free_mem+0x139/0x6e0 [ 2929.922857][ C0] out_of_memory+0x29c/0x13c0 [ 2929.927550][ C0] ? find_held_lock+0x35/0x130 [ 2929.932317][ C0] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2929.938129][ C0] ? oom_killer_disable+0x280/0x280 [ 2929.943347][ C0] mem_cgroup_out_of_memory+0x1d8/0x240 [ 2929.948892][ C0] ? memcg_oom_wake_function+0x700/0x700 [ 2929.954533][ C0] ? do_raw_spin_unlock+0x181/0x270 [ 2929.959732][ C0] ? _raw_spin_unlock+0x28/0x40 [ 2929.964586][ C0] try_charge+0xeb1/0x13e0 [ 2929.969014][ C0] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2929.974560][ C0] ? get_mem_cgroup_from_mm+0x1a5/0x4e0 [ 2929.980107][ C0] ? mem_cgroup_css_offline+0x330/0x330 [ 2929.985654][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2929.991363][ C0] ? __vm_enough_memory+0x1b7/0x390 [ 2929.996565][ C0] mem_cgroup_try_charge+0x136/0x590 [ 2930.001870][ C0] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2930.007529][ C0] shmem_getpage_gfp+0x863/0x29b0 [ 2930.012577][ C0] ? shmem_unuse_inode+0x1100/0x1100 [ 2930.017856][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2930.024093][ C0] ? balance_dirty_pages_ratelimited+0x168/0x1e00 [ 2930.030508][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2930.036743][ C0] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2930.042645][ C0] shmem_write_begin+0x105/0x1e0 [ 2930.047588][ C0] generic_perform_write+0x23b/0x540 [ 2930.052868][ C0] ? timestamp_truncate+0x2f0/0x2f0 [ 2930.058096][ C0] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2930.066162][ C0] ? update_time+0xb0/0xb0 [ 2930.070583][ C0] ? __kasan_check_write+0x14/0x20 [ 2930.075689][ C0] ? down_write+0xdf/0x150 [ 2930.080125][ C0] __generic_file_write_iter+0x25e/0x630 [ 2930.085765][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2930.091489][ C0] generic_file_write_iter+0x420/0x68e [ 2930.096952][ C0] ? __generic_file_write_iter+0x630/0x630 [ 2930.102759][ C0] ? retint_kernel+0x2b/0x2b [ 2930.107347][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2930.113589][ C0] ? iov_iter_init+0xee/0x220 [ 2930.118274][ C0] new_sync_write+0x4d3/0x770 [ 2930.122955][ C0] ? new_sync_read+0x800/0x800 [ 2930.127744][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2930.133903][ C0] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2930.139196][ C0] __vfs_write+0xe1/0x110 [ 2930.143527][ C0] vfs_write+0x268/0x5d0 [ 2930.147774][ C0] ksys_pwrite64+0x183/0x1c0 [ 2930.152364][ C0] ? __ia32_sys_pread64+0xf0/0xf0 [ 2930.157386][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2930.162841][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2930.168755][ C0] ? do_syscall_64+0x26/0x790 [ 2930.173447][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.180463][ C0] ? do_syscall_64+0x26/0x790 [ 2930.185157][ C0] __x64_sys_pwrite64+0x97/0xf0 [ 2930.190015][ C0] do_syscall_64+0xfa/0x790 [ 2930.194532][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2930.200426][ C0] RIP: 0033:0x415197 [ 2930.204350][ C0] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2930.223963][ C0] RSP: 002b:00007fda7d230a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2930.232383][ C0] RAX: ffffffffffffffda RBX: 00007fda7d2316d4 RCX: 0000000000415197 [ 2930.240362][ C0] RDX: 0000000008100000 RSI: 0000000020000680 RDI: 0000000000000008 [ 2930.248426][ C0] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 2930.256402][ C0] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 2930.264378][ C0] R13: 0000000000000ba5 R14: 00000000004cc7cf R15: 000000000075bfd4 [ 2930.272656][ C0] rcu: rcu_preempt kthread starved for 10500 jiffies! g472173 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 2930.283925][ C0] rcu: RCU grace-period kthread stack dump: [ 2930.289821][ C0] rcu_preempt R running task 29152 10 2 0x80004000 [ 2930.297737][ C0] Call Trace: [ 2930.301043][ C0] __schedule+0x934/0x1f90 [ 2930.305470][ C0] ? __sched_text_start+0x8/0x8 [ 2930.310316][ C0] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2930.316115][ C0] ? schedule_timeout+0x47c/0xc50 [ 2930.321141][ C0] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2930.326436][ C0] schedule+0xdc/0x2b0 [ 2930.330507][ C0] schedule_timeout+0x486/0xc50 [ 2930.335351][ C0] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2930.341246][ C0] ? usleep_range+0x170/0x170 [ 2930.345918][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2930.350949][ C0] ? __next_timer_interrupt+0x1a0/0x1a0 [ 2930.356502][ C0] ? swake_up_one+0x60/0x60 [ 2930.361015][ C0] rcu_gp_kthread+0xa10/0x1940 [ 2930.365791][ C0] ? rcu_note_context_switch+0x1980/0x1980 [ 2930.371594][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2930.376625][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2930.382869][ C0] ? __kthread_parkme+0x108/0x1c0 [ 2930.387886][ C0] ? __kasan_check_read+0x11/0x20 [ 2930.392915][ C0] kthread+0x361/0x430 [ 2930.396981][ C0] ? rcu_note_context_switch+0x1980/0x1980 [ 2930.402778][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2930.408530][ C0] ret_from_fork+0x24/0x30